How to monitor your Microsoft 365 MFA setup using Entra ID workbooks

Multi-factor authentication (MFA) is an essential layer of security for Microsoft 365 environments, protecting user accounts and sensitive data from unauthorized access. However, maintaining a balance between strong security and user convenience can be challenging, especially when frequent authentication prompts disrupt productivity. Monitoring and understanding authentication prompts involves analyzing various factors, including user behaviors, device compliance, and application-specific trends. Using Microsoft Entra ID audit logs to track MFA events can provide raw data but lack the actionable insights needed to identify anomalies or optimize user experiences effectively.

Microsoft Entra ID workbooks simplify this challenge by transforming raw log data into visually intuitive dashboards and reports. The Authentication Prompts Analysis workbook offers a detailed view of how authentication prompts occur across users, devices, and applications, helping IT teams detect inefficiencies, troubleshoot issues, and refine policies for improved security and usability.

In this blog, we’ll examine the key features of the Authentication Prompts Analysis workbook, explore its reports, and provide recommendations for optimizing your Microsoft 365 MFA setup to balance security with user satisfaction.

How to Access the Authentication Prompts Analysis Workbook

To access the Authentication Prompts Analysis workbook in Microsoft Entra ID, follow these steps.

  1. Log in to Microsoft Entra ID using an account with permissions to access workbooks.
  2. Navigate to Identity > Monitoring & Health > Workbooks.
  3. Select the Authentication Prompts Analysis workbook from the available templates.
  4. You can filter the workbook using the following filters.
    • Time: Select a specific time range to analyze prompt activity within a defined period.
    • AuthMethod: Filter prompts by the authentication method used, such as passwords, Microsoft Authenticator, or phone-based authentication.
    • DeviceState: Differentiate between managed and unmanaged devices to assess authentication behaviors.
    • AppDisplayName: Focus on prompts generated by specific applications to identify app-specific trends.
    • UserDisplayName: Isolate prompts for particular users to troubleshoot or analyze user-specific issues.
    • AuthStatus: View prompts based on their outcome, such as successful authentications, failures, or interrupted attempts.
    • OS: Analyze prompts by the operating systems involved, such as Windows, macOS, iOS, or Android.

Once opened, this workbook provides interactive dashboards that break down authentication prompts across various dimensions, such as users, devices, methods, and policies.

Microsoft Entra ID Authentication Prompts Analysis workbook explained

The Authentication Prompts Analysis workbook is structured into sections that help administrators identify trends, troubleshoot issues, and optimize MFA prompts. The reports under this workbook include:

  1. Authentication prompts summary
  2. Authentication prompts by authentication method
  3. Authentication prompts by device
  4. Authentication prompts by user
  5. Authentication prompts by application
  6. Authentication prompts by process detail
  7. Authentication prompts by policy

1. Authentication prompts summary

This report provides the total number of authentication prompts over the set period and the number of successful and failed prompts.

A summary chart from the Microsoft Entra ID Authentication Prompts Analysis workbook displaying the total number of authentication prompts, along with successful and failed prompts over a selected period.

2. Authentication prompts by authentication method

This section provides an overview of authentication prompts in your environment by providing the distribution of authentication methods used as a pie chart and a graph of the number of different authentication methods over the set period.

Understanding which methods generate the most prompts allows administrators to identify inefficiencies and consider alternatives like passwordless solutions.

A pie chart and a line graph from the Authentication Prompts Analysis workbook, illustrating the distribution of authentication methods used (e.g., passwords, Microsoft Authenticator) and their frequency over time.

3. Authentication prompts by device

Prompts by operating system

This report shows the distribution of authentication prompts from different operating systems. This can highlight platform-specific issues or misconfigurations.

A bar chart or report highlighting the distribution of authentication prompts across managed and unmanaged devices, providing insights into device-specific MFA activity.

Prompts by Device State

This report shows the distribution of prompts across managed and unmanaged devices.

These insights help refine device-specific conditional access policies.

A breakdown of authentication prompts by operating systems, such as Windows, macOS, iOS, and Android, identifying platform-specific trends or issues.

4. Authentication prompts by user

This section focuses on individual user activity, helping administrators understand how users interact with MFA prompts. It identifies users who encounter frequent authentication prompts.

This is useful for troubleshooting individual user complaints about excessive prompts and detecting suspicious behavior, such as unauthorized access attempts targeting specific users, or providing tailored user education on MFA policies.

A table or graph detailing individual user activity related to MFA prompts, including frequent authentication occurrences, sign-in locations, and device types.

You can also focus on user-specific data, identifying individuals who encounter frequent prompts using the Prompts by user with additional meta data report. it includes the sign-in location, device type, and the number of prompts requested by the user,

Administrators can use this data to provide targeted support and identify potential misuse.

5. Authentication prompts by application

This report helps you analyze how MFA prompts are distributed across the applications in your Microsoft 365 environment. It offers a clear understanding of application-specific trends that can inform policy optimizations.

A visualization showing MFA prompt distribution across different Microsoft 365 applications, with details on application names, sign-in times, and authentication outcomes.

You can also focus on user-specific data, identifying individuals who encounter frequent prompts using the Prompts by application with additional meta data report. It includes the application name, the time of sign-in, the result of the authentication attempt, and the number of tries.

Analyzing this data helps optimize app-specific authentication policies.

6. Authentication prompts by process detail

This report dives into the specific processes triggering authentication prompts, providing:

  • Details of workflows or processes generating multiple prompts.
  • Patterns in repeated authentications within particular scenarios.
  • This granular level of detail enables administrators to troubleshoot complex authentication issues effectively.

    Detailed report showing workflows or processes generating multiple authentication prompts, aimed at identifying repetitive patterns and troubleshooting specific scenarios.

    7. Authentication Prompts by Policy

    This section maps prompts to specific conditional access and MFA policies. For example:

    • Policies triggering frequent re-authentication for unmanaged devices.
    • MFA enforcement rules that require repeated verification based on user location.
    • By correlating prompts with policies, administrators can adjust configurations to minimize unnecessary disruptions.

      A mapping of authentication prompts to conditional access and MFA policies, highlighting policies that may trigger frequent re-authentication or location-based verifications.

      Recommendations for reducing prompts and improving user experience

      Reducing authentication prompts not only enhances user satisfaction but also improves productivity without compromising security. Here are some actionable recommendations displayed in the Authentication Prompts Analysis workbook:

      Managed Devices

      Enroll devices in management solutions like Microsoft Intune to allow seamless authentication through conditional access policies. You can verify the enrollment of your devices with the % | Count of Managed Devices report displayed in this section.

      Windows Hello for Business

      Implement Windows Hello for Business for passwordless sign-ins using biometrics or PINs tied to trusted devices.You can verify this with the %WHFB | Count of Windows Devices report displayed in this section.

      Mobile Authentications

      Optimize mobile workflows by leveraging app-based authentication methods like Microsoft Authenticator for smoother user experiences. You can verify this with the % Auth App Authentications | Count of Android/iOS Devices report displayed in this section.

      Mac OS Authentications

      Ensure macOS users benefit from native authentication support and implement certificate-based authentication for a seamless experience. You can verify this with the % | Count of Mac Authentications report displayed in this section.

      Get a clear overview of your Microsoft 365 environment with M365 Manager Plus

      ManageEngine M365 Manager Plus is a comprehensive administration and security solution for Microsoft 365 used for reporting, managing, monitoring, auditing, and creating alerts for critical activities in your Microsoft 365 environments. You can gain a thorough understanding of your environment not just in Microsoft Entra ID, but also Exchange Online, SharePoint Online, OneDrive for Business, and other Microsoft 365 services, with detailed reports and intuitive visualizations, all from a single console.

      There are also other benefits to using M365 Manager Plus to manage and monitor your Microsoft 365 environment

      Effortlessly schedule and export reports on your Microsoft 365 environment.

      Try now for free
 

Streamline your Microsoft 365 governance and administration with M365 Manager Plus

Get Your Free Trial

Related Resources

 
x
A holistic Microsoft 365 administration and security solution
 
x
 
Back to TopBack to Top