Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Conditional Access Gap Analysis - Windows Sign In should be removed from App Report #1824

Open
JefTek opened this issue Mar 4, 2022 · 7 comments
Labels

Comments

@JefTek
Copy link
Member

JefTek commented Mar 4, 2022

In reviewing the CA GAP Analysis workbook, in the Unprotected Applications section, the report of Number of Users Signing in to Applications with Conditional Access Policies Not applied, it includes the Windows Sign-In "app"

image

This is the sign in to the Windows device and PRT acquisition process and would not be in scope of CA. This causes lots of "noise" in the report since most users will have this event.

Can we remove the "Windows Sign-In" app from this report?

@JefTek JefTek added the bug label Mar 4, 2022
@gardnerjr
Copy link
Contributor

@sabinasmith It looks like you might be the author of this template?

@gardnerjr gardnerjr assigned gardnerjr and unassigned gardnerjr Mar 10, 2022
@james-seddon-paymentsense

Any update on this? Also facing the same issue, 60% of our logins not covered by MFA are from "Windows Sign In" which isn't covered by conditional access, so it makes zero sense for these to be reported on at all.

@c3rberus
Copy link

c3rberus commented Sep 8, 2023

Agreed, this should not be part of the report.

Palciny added a commit to Palciny/Application-Insights-Workbooks that referenced this issue Sep 11, 2023
conditionalAccessGapAnalyzer.workbook is including "Windows SignIn" that doesn't support MFA, so it doesn't have sense to be included in the report.

There was also request for this change: 

microsoft#1824
@james-seddon-paymentsense

@sabinasmith did you ever look in to this?

@Palciny
Copy link

Palciny commented Nov 15, 2023

@gardnerjr can you review my changes in #2418 that fix this Issue?

@gardnerjr
Copy link
Contributor

@Palciny someone from the Azure AD Workbooks team needs to approve, they're the codeowners of that area.

@KeysAU
Copy link

KeysAU commented Oct 3, 2024

Same issue, can this please be fixed. 2022! this bug was logged.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

6 participants