We are working on this but we don’t have a public ETA to share at this time. We will keep you updated as we get closer.
An error occurred while saving the commentOr commented
This issue is urgent for security team because this data is missing from SIEM logs, if you're triggering risky sign in alert based on non-interactive sign in you should definitely log this activity via Azure/MCAS!
1,315 votes115 comments · Azure Active Directory » Multi-factor Authentication · Flag idea as inappropriate… · Admin →
For requiring additional factors with Windows Hello for Business, please see – https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/feature-multifactor-unlock
For why PIN is better than a password, please see https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-why-pin-is-better-than-password
For Authenticator app sign in to Azure AD, please see https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-authentication-phone-sign-in
As always, other feedback is welcome