SC‑300 Study Portal Path 5

Unit 2: Analyze and investigate sign-in logs to troubleshoot access issues

Overview of Microsoft Entra ID reporting architecture

Microsoft Entra ID reporting is divided into activity data and security-related data. Each log type serves a different troubleshooting and investigation purpose.

Activity logs

Activity logs record what happened in your tenant.

Sign-ins

Sign-in logs provide information about:

Use sign-in logs to answer questions such as:

Audit logs

Audit logs capture configuration and directory changes, such as:

Audit logs are essential for change tracking and compliance.

Provisioning logs

Provisioning logs track:

These logs help troubleshoot identity lifecycle automation.

Security logs

Security-related logs focus on risk detection.

Risky sign-ins

A risky sign-in indicates:

Users flagged for risk

A risky user indicates:

These logs are tightly integrated with Microsoft Entra ID Protection.

Who can access sign-in data?

Access to sign-in and reporting data is role-based.

Roles that can access tenant-wide sign-in data

Non-admin users

Licensing requirements for sign-in logs

This distinction is commonly tested in the exam.

The Sign-ins report

The Sign-ins report is the primary tool for investigating authentication issues.

How to access the Sign-ins report

Sign-in records can take up to two hours to appear in the portal.

Important behavior to remember (exam-critical)

Default sign-in log fields

Each sign-in record includes:

These fields allow you to quickly identify:

Customizing the sign-ins view

You can customize the sign-in list by selecting Columns in the toolbar.

Key limitation:

Viewing detailed sign-in information

Selecting a specific sign-in record opens a detailed view that includes:

This view is essential for Conditional Access troubleshooting.

Conditional Access troubleshooting

When you open the Conditional Access tab for a sign-in:

This eliminates guesswork when diagnosing blocked access.

Filtering sign-in activities

Filters help isolate relevant sign-in events.

Commonly used filters include:

Client app filter (exam favorite)

The Client app filter identifies how the user authenticated.

Key examples:

This filter is critical when troubleshooting:

Downloading sign-in data

You can export sign-in logs by selecting Download.

Important limits:

Retention is subject to Microsoft Entra ID log retention policies.

Additional entry points to sign-in data

Sign-in data is also accessible from:

Identity Protection sign-in insights

Identity Protection provides:

Selecting a day reveals:

IP address location caveat (exam note)

IP-based location data is best-effort only.

Reasons include:

Never assume IP location equals physical location.

Application usage reporting

Microsoft Entra ID provides application-centric sign-in analysis.

You can determine:

This data is found under:

Microsoft 365 activity logs

Microsoft 365 activity logs:

You can also access these logs via:

Exam-focused takeaway