![]() The events shown are non-interactive user login events for the VM, which means the IP address will appear to come from the external IP address that your VM accesses Azure AD from. ![]() If you can access your Azure AD sign-in logs through Log Analytics, you can see if you've enabled multi-factor authentication and which Conditional Access policy is triggering the event. If you try to sign in with multi-factor authentication on a VM, you won't be able to sign in and will receive an error message. VM sign-ins don't support per-user enabled or enforced Azure AD Multi-Factor Authentication. To reconfigure your multi-factor authentication, follow the instructions in Enforce Azure Active Directory Multi-Factor Authentication for Azure Virtual Desktop using Conditional Access. If you've answered "no" to either of those questions, you'll need to reconfigure your multi-factor authentication.
0 Comments
Leave a Reply. |