MFA Usage for Machines/VPN/OWA
The MFA Usage for Machines/VPN/OWA report provides details about how users employ MFA when accessing Windows, macOS, or Linux machines, including login activities, password resets, and account unlocks. Additionally, the report covers MFA usage during logins to Outlook Web Access (OWA) and Virtual Private Networks (VPNs). The report offers details such as the username, the time MFA was attempted, the policy applied to each user, the kind of action MFA was used for, the endpoint type from which the MFA attempt was made, the IP address of the machine, and the status of each MFA attempt.
Report generation
You can generate the MFA Usage for Machines/VPN/OWA report by following these steps:
- Log into the ADSelfService Plus admin portal with Administrator or Operator privileges and navigate to Reports > MFA Reports > MFA Usage for Machines/VPN/OWA.
- Specify the domain using the Select Domain option.
- Specify OUs (if necessary) using the Select OUs option.
- The Period drop-down menu can be used to specify the time period for which to generate the reports. Options include Today, Yesterday, Last 7 days, Last 30 days, This month, and Custom Period.
- Click Generate to generate the report.
Report customization
- Adding or removing columns: To add or remove columns, click on the Add/Remove Columns[] option at the far right of the report. In the Select the columns to be displayed pop-up that appears, select the required fields under Available Columns and click on the right arrow [>>] to move it to the Selected Columns. To remove columns, select the unused fields under Selected Columns and click on the left arrow [<<] to move it to Available Columns.
- Ordering the columns: The columns' positions can also be altered by selecting a value under Selected Columns and using the Up and Down options to change its position.
Advanced Filtering
- Once the report is generated, the entries can be narrowed-down based on the following parameters by clicking on the Advanced Filter [] icon at the far right of the report
- Name: This option lets you narrow-down the MFA attempts by username. The conditions available to refine this include Contains, Does Not Contain, Equals, Is Not Equal To, Starts With, and Ends With.
- Attempted from: This option lets you display results by the name of the endpoint MFA was attempted from. The conditions available to refine this include Contains, Does Not Contain, Equals, Is Not Equal To, Starts With, and Ends With.
- IP Address: This option lets you display results by IP address. The conditions available to refine this include Contains, Does Not Contain, Equals, Is Not Equal To, Starts With, and Ends With.
- Attempted Action:The report entries can be narrowed-down based on the MFA action attempted or excluding a certain action. The actions available to refine this include Machine Login, OWA Login, Reset Password, VPN Login, and more.
- Authenticator: Click on Details in the Authenticator column to display all the authenticators used for the MFA attempt, including each of their MFA statuses.
- Endpoint Type: The sub-options available under Endpoint Type include Windows Login agent, macOS Login Agent, Linux Login Agent, VPN Login, and OWA Login.
- Policy Name: This option lets you narrow-down the MFA attempts by policy name. The conditions available to refine this include Contains, Does Not Contain, Equals, Is Not Equal To, Starts With, and Ends With.
- Status: Entries can be narrowed-down by whether MFA was a Success or a Failure, or if MFA was Incomplete.
Sorting
Click on any of the column headers (except the Status and Authenticator columns) to view the report's entries in ascending or descending order.
Searching
- Click on the search icon[ ] in order to search for specific data in the report.
- Specific users can be searched for using attributes such as the username, Policy Name, IP Address, and type of endpoint MFA was Attempted From.
- Searching happens using the criteria 'contains'. For example, if the username column is searched for the word "jack" , then all usernames containing the sequence "jack" will be displayed as a result.
Schedule Reports, Export As and More
- The Schedule Reports option can be used to schedule the generation of reports at specified intervals, and automatically email them to administrators or specific email addresses Learn to schedule reports here.
- The Export As option at the right corner of the page helps export the report in CSV, PDF, XLS, XLSX, HTML and CSVDE formats.
- The More option at the right corner of the page lists the Printable View, Send Mail, and Export Settings options.
- The Printable View option can be used to preview and print the report.
- The Send Mail option can be used to mail the report to the desired email addresses.
- Additionally, you can configure custom Export Settings, such as a personalized title for the report and a header logo that you may wish to display on each page.