Skip to content

Commit 4e584a6

Browse files
committed
Remove tabs from log entries section
1 parent faa3e5f commit 4e584a6

File tree

1 file changed

+0
-6
lines changed

1 file changed

+0
-6
lines changed

articles/role-based-access-control/elevate-access-global-admin.md

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -342,8 +342,6 @@ When you call `elevateAccess`, you create a role assignment for yourself, so to
342342
343343
When access is elevated, an entry is added to the logs. As a Global Administrator in Microsoft Entra ID, you might want to check when access was elevated and who did it. Elevate access log entries do not appear in the standard activity logs, but instead appear in the Directory Activity logs. This section describes different ways that you can view the elevate access log entries.
344344
345-
# [Azure portal](#tab/azure-portal)
346-
347345
### View elevate access log entries using the Azure portal
348346
349347
1. Sign in to the [Azure portal](https://portal.azure.com) as a Global Administrator.
@@ -358,8 +356,6 @@ When access is elevated, an entry is added to the logs. As a Global Administrato
358356
359357
![Screenshot showing directory activity logs in Monitor.](./media/elevate-access-global-admin/monitor-directory-activity.png)
360358
361-
# [Azure CLI](#tab/azure-cli)
362-
363359
### View elevate access log entries using Azure CLI
364360
365361
1. Use the [az login](/cli/azure/reference-index#az-login) command to sign in as Global Administrator.
@@ -417,8 +413,6 @@ A user in the group can now periodically run the [az rest](/cli/azure/reference-
417413
az rest --url "https://management.azure.com/providers/Microsoft.Insights/eventtypes/management/values?api-version=2015-04-01&$filter=eventTimestamp ge '2021-09-10T20:00:00Z'" > output.txt
418414
```
419415

420-
---
421-
422416
## Next steps
423417

424418
- [Understand the different roles](rbac-and-directory-admin-roles.md)

0 commit comments

Comments
 (0)