![]() You’ll find her blog post below.Īs always, we’d love to hear any feedback or suggestions you may have. Robyn Hicock, who managed this feature, wrote a guest blog post where she dives into the details on this update. ![]() What apps the attacker tried to access.If an attacker successfully signed in to the account from a strange location.If anyone is trying to guess their password.The My Sign-Ins page empowers users to see: ![]() As we discussed in a previous blog post, our team defends against hundreds of millions of password-based attacks every day. ![]() ![]() I’m excited to announce the public preview of Azure AD My Sign-Ins-a new feature that allows enterprise users to review their sign-in history to check for any unusual activity.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |