User Password Reset Events Report

This guide will show an administrator how to view password reset activities that users have initiated on their stored Microsoft account credentials.

Role Requirements

Procedure Scope: Administrators

Required Group Membership: Admin.Compliance

Handbook Reference

Package: TBD

Domain: TBD

Modifies: TBD

Viewing Password Reset Logs
  1. Navigate to the Password Reset Audit Logs – Azure Active Directory portal, here you will find any self-service password reset (SSPR) activities that have been initiated by internal users. From this page you can see the date and time of the occurrence, the activity type that was initiated (blocked from SSPR, change password, reset password, etc.), and the status of the activity (success or failure). Filtering can be adjusted if you know specific information related to the event you are trying to explore.

Need Assistance?

Reach out to your Customer Success Manager to discuss how a Sittadel cybersecurity analyst can assist in managing these tasks for you. New to our services? Inquire about arranging a consultation to explore optimizing your Azure environment for painless management.