Viewing Sign-In Logs Work Instruction

This work instruction will allow administrators to view sign-in activities related to platforms that utilize users Microsoft account for authentication.

This article is intended for employees of organizations that use Sittadel's security. Additionally, there are some actions that can only be accomplished by those with administrative privileges.

Procedure Scope: Administrators

Required Group Membership: Admin.Compliance

  1. Navigate to Sign-In Logs – Azure Active Directory.
  2. From this page you can alter the Date filter to pull sign-in attempts made for up to a 30-day span. You can also enable custom filters to search for specific users, specific application authentication attempts, specific status of the attempt such as success or failure, etc.

You're Finished!

You should have successfully viewed the sign-in logs; adjusting the filters to meet your needs. For any other problems or questions, reach out to us!