Microsoft 365 sign-in logs interrupted

Last Updated: March 2026

If you regularly monitor authentication activity in Microsoft 365 or Microsoft Entra ID (formerly Azure Active Directory), you may have noticed an unusual status appearing in the sign-in logs: “Interrupted.”

Unlike Success or Failure, the Interrupted status is often confusing for administrators because it does not clearly indicate whether the login attempt succeeded, failed, or was blocked by policy.

In security monitoring platforms such as Microsoft Sentinel, Defender XDR, or third-party SIEM tools, these entries can generate alerts, trigger investigations, or create unnecessary noise if misunderstood.

This guide explains:

  • What the Interrupted sign-in status actually means
  • The most common reasons it appears in Microsoft 365 logs
  • How Conditional Access, MFA, and user behavior trigger this status
  • How to investigate these events in a real-world enterprise environment

If you manage identity security, cloud authentication, or SIEM ingestion, understanding this status will help you avoid false positives, improve log analysis, and strengthen identity monitoring.


Quick Fix Summary

If you see “Interrupted” in Microsoft 365 sign-in logs, the most common causes are:

  • The user abandoned the login process before completing authentication.
  • Conditional Access policies required additional steps (such as MFA) that were never completed.
  • The authentication session timed out before completion.
  • The user closed the browser or authentication window during login.

In most environments, Interrupted sign-ins are not security incidents, but they are useful indicators of authentication friction or policy enforcement.


What Does “Interrupted” Mean in Microsoft 365 Sign-In Logs?

Within Microsoft Entra ID authentication logs, the Interrupted status indicates that the authentication process started but did not finish.

The login flow reached an intermediate step but never completed the full authentication sequence.

In other words:

StatusMeaning
SuccessAuthentication completed successfully
FailureAuthentication attempt was rejected
InterruptedAuthentication started but stopped before completion

This typically happens before the final token is issued.

The identity platform began processing the request but the authentication pipeline terminated prematurely.


Where You See the “Interrupted” Status

Administrators commonly encounter this status in:

  • Microsoft Entra ID Sign-in Logs
  • Microsoft Sentinel log ingestion
  • Defender XDR Advanced Hunting
  • Third-party SIEM platforms
  • Conditional Access monitoring reports

Fields where this appears include:

  • Status
  • Authentication Details
  • Conditional Access evaluation
  • Failure reason

Most Common Causes of Interrupted Sign-Ins

In real-world enterprise environments, the majority of Interrupted sign-ins are benign. Below are the most common reasons.


1. User Abandoned the Login Process

This is the most frequent cause.

Example scenario:

  1. User opens Microsoft 365
  2. Enters their username
  3. The MFA prompt appears
  4. User closes the browser or navigates away

The authentication pipeline stops and the sign-in is recorded as Interrupted.

This commonly happens when:

  • Users accidentally start authentication
  • Multiple login windows are opened
  • A user begins login but switches devices

2. Conditional Access Required MFA but It Was Never Completed

If Multi-Factor Authentication is required, Microsoft Entra ID waits for the second authentication factor.

If the MFA step never occurs, the login will eventually be marked as Interrupted.

Example flow:

  1. User enters credentials
  2. Conditional Access policy requires MFA
  3. MFA prompt is sent to the user
  4. The user ignores the prompt

Result:

The login remains incomplete and the session is logged as Interrupted.


3. Browser or Authentication Session Timeout

Authentication flows rely on session tokens that have time limits.

If a user waits too long between authentication steps, the process expires.

Example:

  • User begins login
  • Gets distracted
  • Returns 10–15 minutes later
  • The authentication token has expired

This results in an Interrupted event.


4. Application Redirect Flow Was Broken

Some cloud applications rely on OAuth redirects during authentication.

If this redirect fails or is interrupted, authentication may not finish.

Common causes include:

  • Browser extensions blocking redirects
  • Third-party cookie restrictions
  • Network filtering or proxy interference
  • Endpoint security products interrupting sessions

5. Conditional Access Policy Evaluation Stopped the Flow

In some cases, Conditional Access policies evaluate the request but the user never completes the required action.

Examples:

  • Device compliance required
  • Hybrid join verification
  • Terms of Use acceptance
  • App protection policy requirements

If the user never completes the step, the authentication flow remains incomplete.


How to Investigate an Interrupted Sign-In

If you are reviewing logs for security investigations, follow this structured process.


Step 1: Open Microsoft Entra Sign-In Logs

Navigate to:

Microsoft Entra Admin Center
→ Identity
→ Monitoring
→ Sign-in Logs

Locate the Interrupted event.


Step 2: Review the Authentication Details

Check the Authentication Details section.

Look for:

  • MFA requested but not completed
  • Password entered successfully
  • Device authentication status

This helps determine where the process stopped.


Step 3: Check Conditional Access Results

Expand the Conditional Access tab.

Look for:

  • Policies triggered
  • MFA enforcement
  • Device compliance requirements
  • Location restrictions

Often the login stopped waiting for a policy requirement.


Step 4: Review the Client App and Device Information

The Client App and Device fields can reveal useful patterns.

Example indicators:

  • Legacy authentication clients
  • Mobile device authentication
  • Browser-based login attempts

In some cases, mobile apps start authentication flows that the user never finishes.


Real-World Example From a Security Operations Perspective

In large Microsoft 365 environments (500–5000 users), it’s common to see thousands of Interrupted events daily.

Typical causes include:

  • Users dismissing MFA prompts
  • Mobile email clients starting background authentication
  • Conditional Access requiring device compliance
  • Expired browser sessions

When sending identity logs to SIEM platforms like Microsoft Sentinel, inexperienced analysts sometimes misinterpret these events as:

  • brute-force login attempts
  • authentication failures
  • suspicious activity

In reality, most Interrupted events represent incomplete user activity rather than malicious behavior.

However, they can still be useful signals when combined with other indicators such as:

  • impossible travel events
  • repeated MFA prompts
  • high-risk sign-ins

Additional Tips for Identity Monitoring

Experienced administrators often implement the following practices:

Filter Interrupted Events in SIEM Alerts

Avoid alert fatigue by filtering common authentication noise.

Example strategy:

  • Alert on failed logins
  • Alert on risky sign-ins
  • Exclude standalone Interrupted events

Investigate Unusual Patterns

Interrupted events can still be useful when you see:

  • Hundreds from the same IP address
  • Repeated attempts targeting one user
  • Unusual geographic locations

These may indicate credential-stuffing attempts that never completed authentication.


Monitor MFA Fatigue Attacks

Interrupted events may appear during MFA fatigue attacks, where attackers repeatedly trigger MFA prompts.

Watch for:

  • High volume MFA attempts
  • User denying MFA repeatedly
  • Interrupted followed by failed attempts

FAQ

Why do Microsoft 365 sign-in logs show “Interrupted”?

This status appears when the authentication process starts but never completes. The user may abandon the login, ignore an MFA prompt, or the session may expire before authentication finishes.


Is an Interrupted sign-in a security risk?

Usually not. Most interrupted events are caused by users abandoning login attempts or failing to complete MFA. However, patterns of repeated interrupted logins may indicate suspicious activity.


Can Conditional Access cause Interrupted sign-ins?

Yes. If Conditional Access requires MFA, device compliance, or Terms of Use acceptance and the user does not complete the step, the login may be recorded as Interrupted.


Do Interrupted sign-ins count as failed login attempts?

No. They are classified separately from failed authentication attempts because the process never completed.


Should Interrupted events trigger SIEM alerts?

In most environments they should not trigger alerts on their own, but they can be useful when correlated with other signals like impossible travel, high-risk sign-ins, or suspicious IP addresses.


Conclusion

The “Interrupted” status in Microsoft 365 sign-in logs is one of the most misunderstood authentication events in the identity monitoring ecosystem.

Rather than indicating a failed login or malicious activity, it usually represents a login process that started but was never completed.

Understanding the underlying causes—such as **MFA prompts, Conditional Access requirements, session timeouts, and user behavior—**helps administrators correctly interpret identity logs and reduce false alarms in SIEM systems.

For organizations ingesting identity data into security platforms like Microsoft Sentinel, properly interpreting these events is critical for maintaining accurate threat detection and avoiding alert fatigue.


Last Updated

Last Updated: March 2026

This guide reflects the latest authentication behavior and terminology used in Microsoft Entra ID and Microsoft 365 sign-in logs.

Leave a Reply

Your email address will not be published. Required fields are marked *