Skip to content

Commit 38a73c1

Browse files
author
Markus Vilcinskas
committed
mon110
1 parent c4868c0 commit 38a73c1

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/active-directory/reports-monitoring/howto-view-applied-conditional-access-policies.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,7 @@ Policy.Read.All
9797

9898
## Permissions for PowerShell
9999

100-
Like any other client app, the Microsoft Graph Powershell module needs client permissions to access applied conditional access policies in the sign-in logs. To successfully pull applied conditional access in the sign-in logs, you must consent to the necessary permissions with your administrator account for MS Graph Powershell. As a best practice, consent to:
100+
Like any other client app, the Microsoft Graph PowerShell module needs client permissions to access applied conditional access policies in the sign-in logs. To successfully pull applied conditional access in the sign-in logs, you must consent to the necessary permissions with your administrator account for MS Graph PowerShell. As a best practice, consent to:
101101

102102
- Policy.Read.ConditionalAccess
103103
- AuditLog.Read.All
@@ -117,7 +117,7 @@ The output of this cmdlet contains a **AppliedConditionalAccessPolicies** proper
117117

118118
For more information about this cmdlet, see [Get-MgAuditLogSignIn](https://docs.microsoft.com/powershell/module/microsoft.graph.reports/get-mgauditlogsignin?view=graph-powershell-1.0).
119119

120-
The AzureAD Graph powershell module does not support viewing applied conditional access policies; only the Microsoft Graph Powershell module returns applied conditional access policies.
120+
The AzureAD Graph powerShell module does not support viewing applied conditional access policies; only the Microsoft Graph PowerShell module returns applied conditional access policies.
121121

122122
## Confirming access
123123

@@ -126,13 +126,13 @@ In the **Conditional Access** tab, you see a list of conditional access policies
126126

127127
To confirm you have admin access to view applied conditional access policies in the sign in logs, do:
128128

129-
1. Navigate to the Azure portal.
129+
1. Navigate to the Azure Portal.
130130

131131
2. In the top-right corner, select your directory, and then select **Azure Active Directory** in the left navigation pane.
132132

133133
3. In the **Monitoring** section, select **Sign-in logs**.
134134

135-
4. Click an item in the sign-in row table to bring up the Activity Details: Sign-Ins context pane.
135+
4. Click an item in the sign-in row table to bring up the Activity Details: Sign-ins context pane.
136136

137137
5. Click on the Conditional Access tab in the context pane. If your screen is small, you may need to click the ellipsis [] to see all context pane tabs.
138138

0 commit comments

Comments
 (0)