Skip to content

Penetration Testing Tools

  • Home
  • Google
    • Android
  • Information Security
    • Cyber Security
    • Cybercriminals
    • Data Leak
    • Malware
    • Vulnerability
  • Linux
  • Microsoft
    • Windows
  • Open Source Tool
  • Technology
  • Home
  • Google
    • Android
  • Information Security
    • Cyber Security
    • Cybercriminals
    • Data Leak
    • Malware
    • Vulnerability
  • Linux
  • Microsoft
    • Windows
  • Open Source Tool
  • Technology

Penetration Testing Tools

  • Technology

Microsoft is providing Azure AD Sign-In History for unusual activity

by ddos · October 19, 2019

The official Microsoft blog introduces the latest features of Azure AD Sign-In, which allows users to quickly view all recent logins and unusual behavior. The successful login and failed login behaviors are categorized in the listed login behavior, while the failed login behavior provides detailed records to prevent potential attacking. There have been many cases of corporate users using weak passwords to be blasted. Microsoft hopes to improve the computer security of enterprise users through this improvement.

Image: Microsoft

Users can log in to the account control area to view recent login behaviors. Microsoft provides a separate login log panel for all enterprise users to view all login behaviors. The following information is provided on the login page: someone trying to blast the password, whether the attacker logged into the account from a strange location, which applications the attacker is trying to access, and so on. At the same time, Microsoft also provides summary information about successful logins and failed logins. Users can quickly browse the detailed data of all recent successful logins and failed logins. Microsoft will record the operating system, browser, approximate location, IP address, and applications used by the attacker.

If the user finds that their account has been logged in by an unauthorized user, they can check the security advice provided by Microsoft to improve the overall security of the account. For example, the user needs to change the password immediately to prevent unauthorized users from logging in again, reconfigure security settings, enable multi-factor authentication login in account settings, and the like. Microsoft said that the statistics show that the probability of account theft is reduced by 99.9% after multi-factor authentication is enabled, and few attackers can successfully log in to multi-factor authentication accounts.

Share

Tags: Azure AD Sign-In History

Follow:

  • Next story Microsoft said that Android is the best operating system for Surface Duo
  • Previous story KB4520062 for Windows 10 v1809 will destroy Defender Advanced Threat Protection service

Search

MAKE THE WEBSITE ONLINE

  • Popular Posts
  • Tags
  • Malduck WordPress Malware

    Malware

    Stealthy WordPress Malware Uncovered: Multi-Stage RAT Injects via Header.php, Hides Traces

    July 2, 2025

  • Subdomain Takeover CLI Tool

    Open Source Tool

    Subdominator: CLI tool for detecting subdomain takeovers

    June 3, 2025

  • API security platform

    Open Source Tool

    metlo: open-source API security platform

    June 4, 2025

  • Docker Security

    Open Source Tool

    Varunastra: Securing the Depths of Docker

    June 4, 2025

  • Supply Chain Security

    Open Source Tool

    SadGuard: Dynamic Code Analysis + Supply Chain Detection Attack

    June 5, 2025

  • Amazon AMD Android Apple ARM Artificial intelligence Asus ChatGPT chrome cyberattack cybersecurity facebook Firefox Github google Google Chrome Huawei India Intel Lenovo LG Linux Linux Kernel malware MediaTek Meta Microsoft microsoft edge MSI Nvidia OpenAI Qualcomm ransomware Samsung SK Hynix Sony TSMC ubuntu vulnerability windows Windows 7 Windows 10 Windows 10X Windows 11 Xbox




Reward

Brilliantly

SAFE!

meterpreter.org

Content & Links

Verified by Sur.ly

2022

  • Home
  • About Us
  • Contact Us
  • DMCA NOTICE
  • Privacy Policy

Penetration Testing Tools © 2025. All Rights Reserved.