Skip to content

Commit 358dae6

Browse files
authored
Merge pull request #102152 from klettier/patch-1
Fix typo on Reports reader role
2 parents a01b2a7 + 72077e8 commit 358dae6

15 files changed

+17
-17
lines changed

articles/active-directory/fundamentals/whats-new-archive.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8597,13 +8597,13 @@ For more information about how to use these reports, see [Azure Active Directory
85978597

85988598
---
85998599

8600-
### Use "Report Reader" role (non-admin role) to view Azure AD Activity Reports
8600+
### Use "Reports Reader" role (non-admin role) to view Azure AD Activity Reports
86018601

86028602
**Type:** New feature
86038603
**Service category:** Reporting
86048604
**Product capability:** Monitoring & Reporting
86058605

8606-
As part of customers feedback to enable non-admin roles to have access to Azure AD activity logs, we've enabled the ability for users who are in the "Report Reader" role to access Sign-ins and Audit activity within the Azure portal as well as using the Microsoft Graph API.
8606+
As part of customers feedback to enable non-admin roles to have access to Azure AD activity logs, we've enabled the ability for users who are in the "Reports Reader" role to access Sign-ins and Audit activity within the Azure portal as well as using the Microsoft Graph API.
86078607

86088608
For more information, how to use these reports, see [Azure Active Directory reporting](../reports-monitoring/overview-reports.md).
86098609

articles/active-directory/governance/entitlement-management-logs-and-reporting.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ To view events for an access package, you must have access to the underlying Azu
6060
- Global administrator
6161
- Security administrator
6262
- Security reader
63-
- Report reader
63+
- Reports reader
6464
- Application administrator
6565

6666
Use the following procedure to view events:

articles/active-directory/hybrid/how-to-connect-health-adfs-risky-ip-workbook.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ Additionally, it is possible for a single IP address to attempt multiple logins
3737
2. A Log Analytics Workspace with the “ADFSSignInLogs” stream enabled.
3838
3. Permissions to use the Azure AD Monitor Workbooks. To use Workbooks, you need:
3939
- An Azure Active Directory tenant with a premium (P1 or P2) license.
40-
- Access to a Log Analytics Workspace and the following roles in Azure AD (if accessing Log Analytics through Azure AD portal): Security administrator, Security reader, Report reader, Global administrator
40+
- Access to a Log Analytics Workspace and the following roles in Azure AD (if accessing Log Analytics through Azure AD portal): Security administrator, Security reader, Reports reader, Global administrator
4141

4242

4343
## What is in the report?

articles/active-directory/manage-apps/migrate-adfs-application-activity.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ The AD FS application activity report in the Azure portal lets you quickly ident
2525
* **Prioritize applications for migration.** Get the number of unique users who have signed in to the application in the past 1, 7, or 30 days to help determine the criticality or risk of migrating the application.
2626
* **Run migration tests and fix issues.** The reporting service automatically runs tests to determine if an application is ready to migrate. The results are displayed in the AD FS application activity report as a migration status. If the AD FS configuration is not compatible with an Azure AD configuration, you get specific guidance on how to address the configuration in Azure AD.
2727

28-
The AD FS application activity data is available to users who are assigned any of these admin roles: global administrator, report reader, security reader, application administrator, or cloud application administrator.
28+
The AD FS application activity data is available to users who are assigned any of these admin roles: global administrator, reports reader, security reader, application administrator, or cloud application administrator.
2929

3030
## Prerequisites
3131

@@ -42,7 +42,7 @@ The AD FS application activity data is available to users who are assigned any o
4242

4343
The AD FS application activity report is available in the Azure portal under Azure AD **Usage & insights** reporting. The AD FS application activity report analyzes each AD FS application to determine if it can be migrated as-is, or if additional review is needed.
4444

45-
1. Sign in to the [Azure portal](https://portal.azure.com) with an admin role that has access to AD FS application activity data (global administrator, report reader, security reader, application administrator, or cloud application administrator).
45+
1. Sign in to the [Azure portal](https://portal.azure.com) with an admin role that has access to AD FS application activity data (global administrator, reports reader, security reader, application administrator, or cloud application administrator).
4646

4747
2. Select **Azure Active Directory**, and then select **Enterprise applications**.
4848

articles/active-directory/reports-monitoring/concept-audit-logs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ With an application-centric view, you can get answers to questions such as:
6868

6969
The audit activity report is available in all editions of Azure AD. To access the audit logs, you need to have one of the following roles:
7070

71-
- Report Reader
71+
- Reports Reader
7272
- Security Reader
7373
- Security Administrator
7474
- Global Reader

articles/active-directory/reports-monitoring/concept-provisioning-logs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ To view the provisioning logs, your tenant must have an Azure AD Premium license
4242

4343
Application owners can view logs for their own applications. The following roles are required to view provisioning logs:
4444

45-
- Report Reader
45+
- Reports Reader
4646
- Security Reader
4747
- Security Operator
4848
- Security Administrator

articles/active-directory/reports-monitoring/concept-usage-insights-report.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Accessing the data from Usage and insights requires:
2929

3030
* An Azure AD tenant
3131
* An Azure AD premium (P1/P2) license to view the sign-in data
32-
* A user in the Global Administrator, Security Administrator, Security Reader, or Report Reader roles.
32+
* A user in the Global Administrator, Security Administrator, Security Reader, or Reports Reader roles.
3333

3434
To access Usage & insights:
3535

articles/active-directory/reports-monitoring/howto-analyze-activity-logs-log-analytics.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ To follow along, you need:
3333
* The following roles in Azure Active Directory (if you're accessing Log Analytics through Azure Active Directory portal)
3434
- Security Admin
3535
- Security Reader
36-
- Report Reader
36+
- Reports Reader
3737
- Global Admin
3838

3939
## Navigate to the Log Analytics workspace

articles/active-directory/reports-monitoring/howto-configure-prerequisites-for-reporting-api.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -215,7 +215,7 @@ Accessing sign-in reports requires an Azure Active Directory premium 1 (P1) lice
215215

216216
### Error: The allowed roles doesn't include User.
217217

218-
Avoid errors trying to access audit logs or sign-in using the API. Make sure your account is part of the **Security Reader** or **Report Reader** role in your Azure Active Directory tenant.
218+
Avoid errors trying to access audit logs or sign-in using the API. Make sure your account is part of the **Security Reader** or **Reports Reader** role in your Azure Active Directory tenant.
219219

220220
### Error: Application missing Azure AD 'Read directory data' permission
221221

articles/active-directory/reports-monitoring/howto-download-logs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ You can also download activity logs using Microsoft Graph; however, downloading
6060

6161
While the global administrator works, you should use an account with lower privileges to perform this task. To access the audit logs, the following roles work:
6262

63-
- Report Reader
63+
- Reports Reader
6464
- Global Reader
6565
- Security Administrator
6666
- Security Reader

0 commit comments

Comments
 (0)