What is Microsoft Entra Health?

Microsoft Entra Health (preview) provides you with the ability to view the health of your Microsoft Entra tenant through a report of service level agreement (SLA) attainment and a set of health metrics you can monitor for key Microsoft Entra ID scenarios. All the data is provided at the tenant level. The scenario monitoring solution is currently in public preview and can be enabled or disabled in the Preview Hub; the SLA Attainment report is available by default.

How to access Microsoft Entra Health

You can view the Microsoft Entra Health SLA attainment and Scenario monitoring (preview) from the Microsoft Entra admin center.

  1. Sign into the Microsoft Entra admin center as at least a Reports Reader.
  2. Browse to Identity > Monitoring and health > Health (preview).

Screenshot of the Microsoft Entra Health landing page.

Enable the Scenario monitoring preview

If you'd like to view the Scenario monitoring (preview):

  1. Sign into the [Microsoft Entra admin center] as at least a Reports Reader.
  2. Browse to Identity > Settings > Preview hub.
  3. Enable Scenario monitoring.

Enabling preview feature might take up to 24 hours to populate. Enabling the preview only changes your view, not the entire tenant. You can disable the preview at any time.

SLA attainment

In addition to providing global SLA performance, Microsoft Entra ID now provides tenant-level SLA performance for organizations with at least 5000 monthly active users. The Service Level Agreement (SLA) attainment is the user authentication availability for Microsoft Entra ID. For the current availability target and details on how SLA is calculated, see SLA for Microsoft Entra ID.

Hover your mouse over the bar for a month to view the percentage for that month. A table with the same details appears below the graph.

You can also view SLA attainment using Microsoft Graph.

Screenshot of the SLA attainment report.

Scenario monitoring (preview)

Many IT administrators spend a considerable amount of time investigating the health of the following key scenarios:

  • Interactive user sign-in requests that require Microsoft Entra multifactor authentication.
  • User sign-in requests that require a managed device through a Conditional Access policy.
  • User sign-in requests that require a compliant device through a Conditional Access policy.
  • User sign-in requests to applications using SAML authentication.

The data associated with each of these scenarios is aggregated into a view that's specific to that scenario. If you're only interested in sign-ins from compliant devices, you can dive into that scenario without noise from other sign-in activities.

Data is aggregated every 15 minutes, for low latency insights into your tenant's health. Each scenario detail page provides trends and totals for that scenario for the last 30 days. You can set the date range to 24 hours, 7 days, or 1 month.

Select View details on a tile to view the metrics for that scenario. You can also view these metric streams using Microsoft Graph.

Screenshot of the scenario monitoring landing page.

Sign-ins requiring a compliant device

This scenario captures each user authentication that satisfies a Conditional Access policy requiring sign-in from a compliant device.

Screenshot of the compliant device scenario.

Sign-ins requiring a managed device

This scenario captures each user authentication that satisfies a Conditional Access policy requiring sign-in from a managed device.

Screenshot of the managed device scenario.

Sign-ins requiring multifactor authentication (MFA)

This scenario provides two aggregated data graphs. The first displays the number of users who successfully completed an interactive MFA sign-in using a Microsoft Entra cloud MFA service. The metric excludes instances when a user refreshes the session without completing the interactive MFA or using passwordless sign-in methods.

This scenario also provides an aggregated look at failures of interactive MFA sign-in attempts. The same type of refreshed sessions and passwordless methods are excluded from this metric.

Screenshot of the MFA scenario.

Sign-ins to applications using SAML authentication

This scenario looks at SAML 2.0 authentication attempts that the Microsoft Entra cloud service for your tenant successfully processed. This metric currently excludes WS-FED/SAML 1.1 apps integrated with Microsoft Entra ID.

Screenshot of the SAML scenario.