MFA Usage for Machines/VPN/OWA
The MFA Usage for Machines/VPN/OWA report provides details about how users employ MFA when accessing Windows, macOS, or Linux machines, including login activities, password resets, and account unlocks. Additionally, the report covers MFA usage during logins to Outlook Web Access (OWA) and virtual private networks (VPNs). The report offers details such as the username, the time MFA was attempted, the policy applied to each user, the kind of action MFA was used for, the endpoint type from which the MFA attempt was made, the IP address of the machine, and the status of each MFA attempt.
Report generation
You can generate the MFA Usage for Machines/VPN/OWA report by following these steps:
- Log in to the ADSelfService Plus admin portal with administrator or operator privileges and navigate to Reports > MFA Reports > MFA Usage for Machines/VPN/OWA.
- Specify the domain in which to search using the Select Domain option.
- Specify OUs (if necessary) using the Select OUs option.
- The Period drop-down menu can be used to specify the period for which to generate reports. Options include Today, Yesterday, Last 7 days, Last 30 days, This month, and Custom Period.
- Click Generate to generate the report.
The Status column displays if the MFA status of each attempt was a Success or a Failure. Incomplete verification attempts are also displayed. Click Details in the Authenticator column to display all the authenticators used for the MFA attempt, including each of their MFA statuses.
Report customization
- Adding or removing columns: To add or remove columns, click the Add/Remove Columns [ ] option at the far-right side of the report page. In the Select the columns to be displayed pop-up that appears, select the required fields under Available Columns and click the right arrow [>>] to move it to Selected Columns. To remove columns, select the unused fields under Selected Columns and click the left arrow [<<] to move it to Available Columns.
- Ordering the columns: The columns' positions can also be altered by selecting a value under Selected Columns and using the Up and Down buttons to change its position.
Advanced filtering
- Once the report is generated, the entries can be narrowed-down based on the following parameters by clicking the Advanced Filter [ ] icon at the far-right of the report:
- Name: This option lets you narrow down the MFA attempts by username. The conditions available to refine this include Contains, Does Not Contain, Equals, Is Not Equal To, Starts With, and Ends With.
- Attempted From: This option lets you display results by the name of the endpoint MFA was attempted from. The conditions available to refine this include Contains, Does Not Contain, Equals, Is Not Equal To, Starts With, and Ends With.
- IP Address: This option lets you display results by IP address. The conditions available to refine this include Contains, Does Not Contain, Equals, Is Not Equal To, Starts With, and Ends With.
- Status: Entries can be narrowed down by whether MFA was a Success or a Failure, or if MFA was Incomplete.
- Attempted Action: The report entries can be narrowed down based on the MFA action attempted or excluding a certain action. The actions available to refine this include ADSelfService Login, Machine Login, OWA Login, Reset Password, and SSO Application Login.
- Authenticator: The report entries can be narrowed based on the authenticator with which MFA was attempted. You can do this by specifying or excluding a particular authenticator.
- Access Mode: The report entries can be narrowed based on the type of device MFA was attempted from. You can do this by specifying or excluding a particular device type.
- Policy Name: This option lets you narrow down the MFA attempts by policy name. The conditions available to refine this include Contains, Does Not Contain, Equals, Is Not Equal To, Starts With, and Ends With.
Sorting
Click any of the column headers (except the Status and Authenticator columns) to view the report's entries in ascending or descending order.
Searching
- Click the search icon [ ] to search for specific data in the report.
- Specific users can be searched for using attributes such as the username, policy name, IP address, and type of endpoint MFA was attempted from.
- Searching happens using the criteria contains. For example, if the username column is searched for the word jack, then all usernames containing the sequence jack will be displayed as a result.
Schedule Reports, Export As, and More
- The Schedule Reports option can be used to schedule the generation of reports at specified intervals and automatically email them to administrators or specific email addresses. Learn how to schedule reports here.
- The Export As option at the right corner of the page helps export the report in CSV, PDF, XLS, XLSX, HTML, and CSVDE formats.
- The More option at the right corner of the page lists the Printable View, Send Mail, and Export Settings options.
- The Printable View option can be used to preview and print the report.
- The Send Mail option can be used to email the report to the desired email addresses.
- Additionally, you can configure custom Export Settings, such as a personalized title for the report and a header logo that you may wish to display on each page.
Don't see what you're looking for?
-
Visit our community
Post your questions in the forum.
-
Request additional resources
Send us your requirements.
-
Need implementation assistance?
Try onboarding