Getting Data In

Azure Authentication Logs - Authentication Method Field- How to filter?

Dmikos1271
Explorer

In our Splunk environment, we currently ingest Azure AD logs and we have three different sourcetypes:

azure:aad:signin
azure:aad:audit

azure:aad:user

There no missing events and the ingested data is very rich. However, I don't see any way within the Splunk ingested Azure signin data to to filter by authentication method (Single-factor vs multi-factor). This is something that can be done via Azure Active Directory, Monitoring, Sign-in logs but I do not see any reference to it in my Splunk data (I do see a lot of conditional access enforcement and the other primary fields, but not any of the secondary fields that could be used for filtering in Azure):

Dmikos1271_0-1653058959208.png

 

0 Karma

dansyring
New Member

Did you find an answer to this?

0 Karma
Get Updates on the Splunk Community!

Community Content Calendar, November Edition

Welcome to the November edition of our Community Spotlight! Each month, we dive into the Splunk Community to ...

October Community Champions: A Shoutout to Our Contributors!

As October comes to a close, we want to take a moment to celebrate the people who make the Splunk Community ...

Stay Connected: Your Guide to November Tech Talks, Office Hours, and Webinars!

What are Community Office Hours? Community Office Hours is an interactive 60-minute Zoom series where ...