![]() To be useful, the strings need to be changed to clearly indicate the application in user terms, not internal Microsoft speak. I think the root cause here is that the internal strings used by Office 365 applications to identity themselves when they authenticate with Azure AD were never designed to be exposed to end users. These easily-understood and relevant names leave no doubt in user minds as to what they signed into. Some apps do a good job of identifying themselves, like the Graph Explorer and the Microsoft 365 Security and Compliance Center. Maybe OWA and Teams are in the catch-all “Office 365” app. I can’t account for why these events aren’t easily discernible in this data. ![]() Yet anyone who has ever examined evidence of Teams sign-in activity in the Office 365 audit log knows that a record is logged hourly when accounts are active. There’s no evidence of OWA, which I use heavily, nor do I see any mention of Teams in the records I reviewed going back over the last week. I don’t use Skype for Business Online, so I have no idea what the Skype Web Experience is, nor what I was doing to extend SharePoint Online. I think ProjectWorkManagement is Planner.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |