You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/howto-view-applied-conditional-access-policies.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -97,7 +97,7 @@ Policy.Read.All
97
97
98
98
## Permissions for PowerShell
99
99
100
-
Like any other client app, the Microsoft Graph Powershell module needs client permissions to access applied conditional access policies in the sign-in logs. To successfully pull applied conditional access in the sign-in logs, you must consent to the necessary permissions with your administrator account for MS Graph Powershell. As a best practice, consent to:
100
+
Like any other client app, the Microsoft Graph PowerShell module needs client permissions to access applied conditional access policies in the sign-in logs. To successfully pull applied conditional access in the sign-in logs, you must consent to the necessary permissions with your administrator account for MS Graph PowerShell. As a best practice, consent to:
101
101
102
102
- Policy.Read.ConditionalAccess
103
103
- AuditLog.Read.All
@@ -117,7 +117,7 @@ The output of this cmdlet contains a **AppliedConditionalAccessPolicies** proper
117
117
118
118
For more information about this cmdlet, see [Get-MgAuditLogSignIn](https://docs.microsoft.com/powershell/module/microsoft.graph.reports/get-mgauditlogsignin?view=graph-powershell-1.0).
119
119
120
-
The AzureAD Graph powershell module does not support viewing applied conditional access policies; only the Microsoft Graph Powershell module returns applied conditional access policies.
120
+
The AzureAD Graph powerShell module does not support viewing applied conditional access policies; only the Microsoft Graph PowerShell module returns applied conditional access policies.
121
121
122
122
## Confirming access
123
123
@@ -126,13 +126,13 @@ In the **Conditional Access** tab, you see a list of conditional access policies
126
126
127
127
To confirm you have admin access to view applied conditional access policies in the sign in logs, do:
128
128
129
-
1. Navigate to the Azure portal.
129
+
1. Navigate to the Azure Portal.
130
130
131
131
2. In the top-right corner, select your directory, and then select **Azure Active Directory** in the left navigation pane.
132
132
133
133
3. In the **Monitoring** section, select **Sign-in logs**.
134
134
135
-
4. Click an item in the sign-in row table to bring up the Activity Details: Sign-Ins context pane.
135
+
4. Click an item in the sign-in row table to bring up the Activity Details: Sign-ins context pane.
136
136
137
137
5. Click on the Conditional Access tab in the context pane. If your screen is small, you may need to click the ellipsis […] to see all context pane tabs.
0 commit comments