In case you and your team members are working on a small project which has only MFA enabled on the Admin account you’ve been given with, here’s how you can check who was trying to sign-in if it wasn’t any of your team members!!
Microsoft 365 Portal
- Drop down from the right hand side menu on the top right of your profile in M365, click on View account.
- Then, on the left hand side menu, look for My sign-ins.
- In here, you’ll find the location and the IP address that was used when someone attempted sign-in from your account.
- If it looks like a location you aren’t a part of and suspect this is attempted breach of security, you should let you System Administrator know and also change your password and revaluate your MFA identities.
Hope this helps!
Here are some Power Automate posts you want to check out –
- Select the item based on a key value using Filter Array in Power Automate
- Select values from an array using Select action in a Power Automate Flow
- Blocking Attachment Extensions in Dynamics 365 CRM
- Upgrade Dataverse for Teams Environment to Dataverse Environment
- Showing Sandbox or Non Production Apps in Power App mobile app
- Create a Power Apps Per User Plan Trial | Dataverse environment
- Install On-Premise Gateway from Power Automate or Power Apps | Power Platform
- Co-presence in Power Automate | Multiple users working on a Flow
- Search Rows (preview) Action in Dataverse connector in a Flow | Power Automate
- Suppress Workflow Header Information while sending back HTTP Response in a Flow | Power Automate
- Call a Flow from Canvas Power App and get back response | Power Platform
- FetchXML Aggregation in a Flow using CDS (Current Environment) connector | Power Automate
- Parsing Outputs of a List Rows action using Parse JSON in a Flow | Common Data Service (CE) connector
- Asynchronous HTTP Response from a Flow | Power Automate
- Validate JSON Schema for HTTP Request trigger in a Flow and send Response | Power Automate
- Converting JSON to XML and XML to JSON in a Flow | Power Automate