All the information above is available to any user in the tenant. When data is gathered by a privileged role, you can also collect MFA information. This makes it possible to get an overview of how many MFA methods (if any) are registered per user (including FIDO2).