![]() You can access your sign-in logs by running the following Kusto query: let UPN = "userupn" ![]() The events shown are non-interactive user login events for the VM, which means the IP address will appear to come from the external IP address from which your VM accesses Microsoft Entra ID. If you have integrated Microsoft Entra logs with Azure Monitor logs to access your Microsoft Entra sign-in logs through Log Analytics, you can see if you've enabled multifactor authentication and which Conditional Access policy is triggering the event. If you try to sign in with multifactor authentication on a VM, you won't be able to sign in and will receive an error message. VM sign-ins don't support per-user enabled or enforced Microsoft Entra multifactor authentication. To reconfigure your multifactor authentication, follow the instructions in Enforce Microsoft Entra multifactor authentication for Azure Virtual Desktop using Conditional Access. If you've answered no to either of those questions, you'll need to reconfigure your multifactor authentication.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |