Skip to content

Commit 8599a8e

Browse files
authored
PR review: Update overview.md
Acrolinx fixes
1 parent b95108f commit 8599a8e

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/governance/management-groups/overview.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ above subscriptions. You organize subscriptions into management groups; the gove
1414
cascade by inheritance to all associated subscriptions.
1515

1616
Management groups give you enterprise-grade management at scale, no matter what type of subscriptions you might have.
17-
However, all subscriptions within a single management group must trust the same Entra ID tenant.
17+
However, all subscriptions within a single management group must trust the same Microsoft Entra ID tenant.
1818

1919
For example, you can apply policies to a management group that limits the regions available for virtual machine (VM) creation. This policy would be applied to all nested management groups, subscriptions, and resources and allow VM creation only in authorized regions.
2020

@@ -56,15 +56,15 @@ subscriptions.
5656
Each directory is given a single top-level management group called the **root** management group. The
5757
root management group is built into the hierarchy to have all management groups and subscriptions
5858
fold up to it. This root management group allows for global policies and Azure role assignments to
59-
be applied at the directory level. The [Entra ID Global Administrator needs to elevate
59+
be applied at the directory level. The [Microsoft Entra ID Global Administrator needs to elevate
6060
themselves](../../role-based-access-control/elevate-access-global-admin.md) to the User Access
6161
Administrator role of this root group initially. After elevating access, the administrator can
6262
assign any Azure role to other directory users or groups to manage the hierarchy. As an administrator,
6363
you can assign your account as the owner of the root management group.
6464

6565
### Important facts about the root management group
6666

67-
- By default, the root management group's display name is **Tenant root group** and operates itself as a management group. The ID is the same value as the Entra ID tenant ID.
67+
- By default, the root management group's display name is **Tenant root group** and operates itself as a management group. The ID is the same value as the Microsoft Entra ID tenant ID.
6868
- To change the display name, your account must be assigned the **Owner** or **Contributor** role on the
6969
root management group. See
7070
[Change the name of a management group](manage.md#change-the-name-of-a-management-group) to update
@@ -78,7 +78,7 @@ you can assign your account as the owner of the root management group.
7878
that root management group.
7979
- Everyone who has access to a subscription can see the context of where that subscription is in
8080
the hierarchy.
81-
- No one is given default access to the root management group. Entra ID Global Administrators are
81+
- No one is given default access to the root management group. Microsoft Entra ID Global Administrators are
8282
the only users that can elevate themselves to gain access. Once they have access to the root
8383
management group, the global administrators can assign any Azure role to other users to manage
8484
it.
@@ -98,7 +98,7 @@ The reason for this process is to make sure there's only one management group hi
9898
directory. The single hierarchy within the directory allows administrative customers to apply global
9999
access and policies that other customers within the directory can't bypass. Anything assigned on the
100100
root will apply to the entire hierarchy, which includes all management groups, subscriptions,
101-
resource groups, and resources within that Entra ID tenant.
101+
resource groups, and resources within that Microsoft Entra ID tenant.
102102

103103
## Management group access
104104

0 commit comments

Comments
 (0)