Skip to content

Commit 47bdb85

Browse files
committed
edit pass: how-to-view-applied-conditional-access-policies
1 parent 86ac7f8 commit 47bdb85

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/active-directory/reports-monitoring/how-to-view-applied-conditional-access-policies.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@ To view the sign-in logs, use:
102102

103103
`Get-MgAuditLogSignIn`
104104

105-
The output of this cmdlet contains an `AppliedConditionalAccessPolicies` property that shows all the Conditional Access policies applied to the sign-in. For more information about this cmdlet, see [Get-MgAuditLogSignIn](https://docs.microsoft.com/powershell/module/microsoft.graph.reports/get-mgauditlogsignin?view=graph-powershell-1.0).
105+
The output of this cmdlet contains an `AppliedConditionalAccessPolicies` property that shows all the Conditional Access policies applied to the sign-in. For more information about this cmdlet, see [Get-MgAuditLogSignIn](/powershell/module/microsoft.graph.reports/get-mgauditlogsignin).
106106

107107
The Azure AD Graph PowerShell module doesn't support viewing applied Conditional Access policies. Only the Microsoft Graph PowerShell module returns applied Conditional Access policies.
108108

@@ -114,7 +114,7 @@ To confirm that you have admin access to view applied Conditional Access policie
114114

115115
1. Go to the Azure portal.
116116

117-
2. In the top-right corner, select your directory, and then select **Azure Active Directory** on the left pane.
117+
2. In the upper-right corner, select your directory, and then select **Azure Active Directory** on the left pane.
118118

119119
3. In the **Monitoring** section, select **Sign-in logs**.
120120

0 commit comments

Comments
 (0)