Forum Discussion
Azure AD Sign-ins Logs
Office 365 Shell WCSS-Client is the browser code that runs whenever a user navigates to (most) Office365 applications in the browser. The shell, also known as the suite header, is shared code that loads as part of almost all Office365 workloads, including SharePoint, OneDrive, Outlook, Yammer, and many more
The other apps can be apps that are registered in Azure AD. For example developers that are creating Apps in connection with Azure AD. Therefore they need to create an app registration. If you go to Azure Active Directory -> App Registrations you get an overview of all registrations that are connected towards your Azure AD tenant.
- KemalMMay 12, 2020Copper Contributor
JordyBlommaert Thank you for your reply and explanations for Office365 Shell WCSS-Client. However, I'm definitely disagree with other comment. I have applications in my sign-in logs like:
ACOM Azure Website
AEO Frontend Production
dev-rel-auth-prod
which are not listed in Applications list in the portal. There is also AIRS application which is only listed among applications, but there is no any other explanation. So, I am trying to learn what those applications are and what they are used for.
Thx,
- JordyBlommaertMay 13, 2020Brass ContributorDo you see those sign-in logs towards a lot of users? Or only specific users? I think it's not a generic application but a custom developed one.
- KemalMMay 13, 2020Copper Contributor
JordyBlommaert, I see those logs from my own sign-in logs and I don't have and am not using any specific or home made application.
- Jeff_OliveJun 26, 2020Copper Contributor
I'm seeing unusual failed login attempts to the ACOM Azure Website application as well. Was this question ever answered about what this application is? I also don't see it in the Enterprise Applications listing.
- dbernierJan 13, 2021Copper Contributor
Any update on this. Just came across a log saying I signed in using this Vortex app.
- Betty StolwykMay 12, 2020Brass Contributor
JordyBlommaert Would you or anybody know what the application "vortex [wsfed enabled]" is? It is not a registered application in our tenant. It has popped up for a couple of our users but they do not know what that is or what they did to cause that sign-in activity. All the other sign-in information is as expected (IP address, location, browser, OS)
Here is a sample entry from the Azure Active Directory Sign-In log:
Application: Vortex [wsfed enabled]Resource: Windows Azure Active DirectoryIP address: xx.xxx.xxx.xxLocation: xxxxxx, xx USStatus: InterruptedSign-in error code: 16000Failure reason: OtherClient app: UnknownDevice ID:Browser: Chrome 81.0.4044Operating System: Windows 10Join Type:MFA result:Token issuer type: Azure ADConditional access: Not AppliedMultiple timestamps very close together.2020-05-02T01:38:39.466094Z
2020-05-02T01:38:11.9168794Z
2020-05-02T01:38:11.622332Z
2020-05-02T01:38:10.9504493Z
2020-05-02T01:38:09.696237Z
2020-05-02T01:37:30.4821975Z
2020-05-02T01:37:30.247593Z
2020-05-02T01:37:29.7603399ZAll other information was the same for each timestamp.- JordyBlommaertMay 13, 2020Brass Contributor
Betty Stolwyk Microsoft reported this as an internal error code and can be ignored. Reference Article https://github.com/MicrosoftDocs/azure-docs/issues/10766