Skip to content

Commit 8ab3785

Browse files
committed
Preview edits
1 parent a00f415 commit 8ab3785

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/role-based-access-control/elevate-access-global-admin.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -339,9 +339,9 @@ When you call `elevateAccess`, you create a role assignment for yourself, so to
339339
340340
## View elevate access log entries
341341
342-
When access is elevated, an entry is added to the logs. As a Global Administrator in Microsoft Entra ID, you might want to check when access was elevated and who did it. Elevate access log entries appear in both the Directory audit logs (Preview) and the Directory Activity logs. This section describes different ways that you can view the elevate access log entries.
342+
When access is elevated, an entry is added to the logs. As a Global Administrator in Microsoft Entra ID, you might want to check when access was elevated and who did it. Elevate access log entries appear in both the Directory audit logs and the Directory Activity logs. This section describes different ways that you can view the elevate access log entries.
343343
344-
# [Directory audit logs (Preview)](#tab/directory-audit-logs)
344+
# [Directory audit logs](#tab/directory-audit-logs)
345345
346346
> [!IMPORTANT]
347347
> Elevate access log entries in the Directory audit logs is currently in preview.
@@ -350,7 +350,7 @@ When access is elevated, an entry is added to the logs. As a Global Administrato
350350
351351
1. Sign in to the [Azure portal](https://portal.azure.com) as a Global Administrator.
352352
353-
1. Browse to **Microsoft Entra ID** > **Monitoring ** > **Audit logs**.
353+
1. Browse to **Microsoft Entra ID** > **Monitoring** > **Audit logs**.
354354
355355
1. In the **Service** filter, select **Azure RBAC (Elevated Access)** and then select **Apply**.
356356

0 commit comments

Comments
 (0)