Dashboard of Windows authentication methods usage (WHfB vs password)
A Log Analytics dashboard to monitor Windows authentication method usage (WHfB vs password) across devices and users. It reads the SigninLogs table to report counts, trends and adoption, showing who uses WHfB, who uses passwords, and how usage evolves over time. It supports filtering by device, user and time, and includes a ready-to-import workbook (Workbook.json) to add the report to a Log Analytics workspace in Intune-managed environments.
Security Analysis
No scannable code files found. This repository may contain only binaries, documentation, or unsupported file types.
You might also like
Intune Reporting
Entra ID Groups Inspector is a Log Analytics dashboard that tracks changes to Azure Entra (Azure AD) groups, including creations, deletions, and membership edits. It surfaces audit-log data with built-in visuals, time filters, and export options for security and compliance workflows. Designed for Intune and Entra ID environments, it helps admins quickly validate group governance and access changes.
Intune Monitoring
Free, customizable Azure Workbook dashboard templates for monitoring Microsoft Intune environments. Provides real-time visibility into device compliance, enrollment status, application deployments, security posture, and OS updates. Deploys in under 60 seconds with no app registration or custom permissions required. Data remains within your tenant with full customization support for queries, branding, and visualizations.
Fleetly
An iOS application for managing and monitoring Microsoft Intune-enrolled devices on the go. Features Azure AD authentication, real-time device inventory across all platforms, remote actions (sync, restart, lock, wipe), compliance monitoring, and multi-tenant support with biometric authentication.
Intune Change Tracking
An Azure Workbook for analyzing and tracking changes within Microsoft Intune environments. Provides rich audit log analysis with filters, profile type search with value change tracking, device identity and Autopilot hash tracking, and device operations audit logs.