Blog Post

Tech Talk
2 MIN READ

LogicMonitor User Reports for 2FA

A11ey's avatar
A11ey
Icon for Community Manager rankCommunity Manager
8 months ago

 

Identifying User Accounts Requiring Priority Attention for two-factor authentication (2FA) Readiness 

Using Our User Report Guide

The subsequent steps are designed to offer guidance on utilizing the User Report to assist customers in their 2FA preparation process."

Step 1: Create a new Report by going to Reports -> Add Report

1BaDibBiF4kkyawJm0OMOkm2Dcu1QE3CHj3mKv76J2DvFXId75-dldcWjogTZuHLRz7Q75eQ6ZmA4PKaL7coHLOmTcRMLEhRwZNfjzjtK3_oB2xMaq_3Jc1hegYqPB8iGRNSs6couK27CwmDasLfbvs


 

Step 2: From the available report types, select User Report 

jYpQB_SDpDC_PRmm98VCi1nBf15iiYAV_LckuKKn0JvUGn74kmwm5O9aBSXmBonyNfw3FN5WrT-Ys3ERAukJr9fLAfM4tFNvaxEoWnvjz3kwCrS1Z-B_t9Rz1B4kH77RbQbqdBRBoBY0S6p-2esEdg8

Step 3: (Optional): Under User Report Settings, additional filters can be added by clicking the “More” dropdown to help limit the returned results to user accounts that need to be prioritized for updates, prior to the 2FA activation. For this example, we have added filters for Role Assignment and the Enable 2FA flag to help identify administrators’ user accounts which do not have 2FA enabled, and may get impacted once 2FA is activated. We chose to filter to the Administrator role, and for user accounts that are set to “No” for Enable 2FA.

TTx3IyUFGiMbcdlJiqZdAwhLBgq4AbdmIkZ_hWTSN0-8_RduHWjYe_C6V7Nr4Bd6wtOsHzv4leFuU2OMDV-8U_W1-rRdORd8zg-GshkEdNeiNzhVrVtSfwY7elgUXFji3IWGAOkOzhnr2VNFALM3m3k


Step 4: Ensure appropriate columns are checked for the report outputs. Customers can include as many of the columns as needed, but we recommend including the following columns, highlighted in red, which will help identify user accounts with 2FA not enabled

  • Users with no phone numbers
  • Potential duplicate phone number entries
  • User Accounts with the highest set of privileges which have the pre-mentioned considerations 

We also recommend sorting results by Phone Number, which will organize the results with user accounts with no phone numbers set.

13bk7jWn_GN5CfGGQedIhUl7ntQunBSW_X65z0-_7PXZiFPaYVm1yklhCyUX1WX37PojGvK6U9xeRvyFf1ZU9CKFl31SkQrN7WQ4JW1JpclRWyG1JTzrxKRePxOTpGhbUfjT2gPUGROA6w16rS5Yg9U
 

Step 5: Once the Report configuration is completed, click the Next button and the report will be generated, in which the results can be audited for where action would need to be taken, prior to the 2FA activation. An example of the output is included below, where we identified several administrator users that had no phone numbers, and 2FA was not enabled. Our next steps internally were to update contact information for the active accounts, delete suspended users, and enable 2FA for the users.

0PbWXeJYCKOEZGPrieF6C1FLrbwu19kILhuxaZNNFSeQBteX0RohVDVQX6g7nXUOQrr4kYA9j8qOoz6d326EjPpL71bfPtsJT5FJKiwyfCRjL7kE9ZlZG1FsHUxbYbKvfb0GbmRBVacUX01lF-Rk_1w

Published 8 months ago
Version 1.0
No CommentsBe the first to comment