Skip to Main Content
Liongard Library

Welcome to Liongard Library, where Lions share! This is a community-led space where Liongard users can come to teach and learn from one another.
Share custom Metrics, get inspired and see what’s trending in the Pride.

Pride Etiquette:
➕ Have great custom Metrics? Add them as entries!
🌟 Want to use a Metric? Copy the query and
follow this doc.
👍 Tried a Metric from the Library? Like it!
📣 Have a question or feedback on a Metric? Add a comment!
🔎 Not sure where to start? Learn about Metrics and how to write them.
💬 Need help writing a metric or want to help support others? Join the conversation in our Liongard Lounge #metrics slack channel.


🥴 See something off? Open a support chat to let us know.

Created by Samuel Pierce
Created on Jan 13, 2022

Azure Active Directory: Excluded Groups From MFA enforcement Policy

You will need to customize the displayName in the query to the string you use to describe your MFA policy. For example if your policy name is Required MFA DUO then your metric would look like this instead Groups[?contains(~.Policies.ConditionalAccess[?displayName ==`Required MFA DUO`].conditions.users.excludeGroups[], id) ].displayName

Query

Groups[?contains(~.Policies.ConditionalAccess[?displayName ==`MFA Enforcement`].conditions.users.excludeGroups[], id) ].displayName

  • Attach files