Skip to content

Commit 807f1ab

Browse files
authored
Update how-to-view-applied-conditional-access-policies.md
1 parent 22aa023 commit 807f1ab

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/active-directory/reports-monitoring/how-to-view-applied-conditional-access-policies.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ The sign-in logs in Azure Active Directory (Azure AD) give you the information t
2929

3030
As an Azure AD administrator, you can use the sign-in logs to:
3131

32-
- Troubleshoot sign in problems.
32+
- Troubleshoot sign-in problems.
3333
- Check on feature performance.
3434
- Evaluate the security of a tenant.
3535

@@ -110,7 +110,7 @@ The Azure AD Graph PowerShell module doesn't support viewing applied Conditional
110110

111111
On the **Conditional Access** tab, you see a list of Conditional Access policies applied to that sign-in event.
112112

113-
To confirm that you have admin access to view applied Conditional Access policies in the sign-ins logs:
113+
To confirm that you have admin access to view applied Conditional Access policies in the sign-in logs:
114114

115115
1. Go to the Azure portal.
116116

0 commit comments

Comments
 (0)