This is a part of a question set containing 2 questions: You are responsible for the Office 365 security in your organization.
You want to block legacy authentication to Azure AD as these protocols do not support MFA.
First you need to know if your users have apps that use legacy authentication.
Where should you look?
Click on the arrows to vote for the correct answer
A. B. C. D.Correct Answer: C
You can determine who is using legacy authentication by navigating to Azure Portal-> Azure Active Directory -> Sign-ins.
Choose the Client App Column (add the client app column if it is not shown)
Filter the column and check all legacy authentication clients options.
Filter by status Success:
Option A is incorrect.
Azure AD Connect allows you to manage sync configurations in the cloud, and syncing Active Directory users and groups.
Option B is incorrect.
Azure Active Directory Logs uses a log analytics workspace to query selected metrics and data.
You cannot view the authentication methods from Logs.
Option D is incorrect.
Azure Active Directory - Usage& Insights provides information about your most active applications and sign in success rate.
To know more about legacy authentication, please refer to the link below:
To block legacy authentication to Azure AD, you first need to determine whether any of your users have apps that use legacy authentication. Legacy authentication refers to older authentication protocols that do not support modern security measures such as multi-factor authentication (MFA).
To identify whether any of your users are using apps that use legacy authentication, you can look at the Azure Active Directory (Azure AD) Sign-ins logs. The Sign-ins logs provide information about authentication events in your Azure AD tenant, including information about the authentication method used, the client app that was used, and the user who authenticated.
To access the Sign-ins logs, follow these steps:
Once you have identified any apps or users that are using legacy authentication, you can take steps to block these protocols and enforce MFA for those users. This can be done using Azure AD conditional access policies, which allow you to create rules that restrict access to your Azure AD resources based on various criteria, including the client app being used, the user's location, and the authentication method being used.