Skip to content

Commit 8f287fc

Browse files
committed
Clarity + typo fixes
1 parent 8cb9921 commit 8f287fc

File tree

1 file changed

+9
-5
lines changed

1 file changed

+9
-5
lines changed

articles/active-directory-b2c/active-directory-b2c-reference-audit-logs.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,10 @@ The activity details panel contains the following relevant information:
5858

5959
## View audit logs in the Azure portal
6060

61-
1. Sign in to the [Azure portal](https://portal.azure.com), switch to the directory that contains your Azure AD B2C tenant, and then browse to **Azure AD B2C**.
61+
The Azure portal provides access to the audit log events in your Azure AD B2C tenant.
62+
63+
1. Sign in to the [Azure portal](https://portal.azure.com)
64+
1. Switch to the directory that contains your Azure AD B2C tenant, and then browse to **Azure AD B2C**.
6265
1. Under **Activities** in the left menu, select **Audit logs**.
6366

6467
A list of activity events logged over the last seven days is displayed.
@@ -72,20 +75,20 @@ Several filtering options are available, including:
7275

7376
If you select a row in the list, the activity details for the event are displayed.
7477

75-
To download the ist of activity events in a comma-separated values (CSV) file, select **Download**.
78+
To download the list of activity events in a comma-separated values (CSV) file, select **Download**.
7679

7780
## Get audit logs with the Azure AD reporting API
7881

7982
Audit logs are published to the same pipeline as other activities for Azure Active Directory, so they can be accessed through the [Azure Active Directory reporting API](https://docs.microsoft.com/graph/api/directoryaudit-list). For more information, see [Get started with the Azure Active Directory reporting API](../active-directory/reports-monitoring/concept-reporting-api.md).
8083

8184
### Enable reporting API access
8285

83-
To authenticate to the Azure AD reporting API, you need an Azure Active Directory application registered in your Azure AD B2C tenant with the following API permissions:
86+
To allow script- or application-based access to the Azure AD reporting API, you need an Azure Active Directory application registered in your Azure AD B2C tenant with the following API permissions:
8487

8588
* Microsoft Graph
8689
* Application: Read all audit log data
8790

88-
You can use an existing application registration, or create a new one specifically for use with audit log automation.
91+
You can enable these permissions on an existing application registration within your B2C tenant, or create a new one specifically for use with audit log automation.
8992

9093
To create a new application, assign the required API permissions, and create a client secret, perform the following steps:
9194

@@ -128,7 +131,8 @@ The following PowerShell script shows an example of how to query the Azure AD re
128131
You can try this script in the [Azure Cloud Shell](../cloud-shell/overview.md). Be sure to update it with your application ID, key, and the name of your Azure AD B2C tenant.
129132

130133
```powershell
131-
# This script requires the registration of a Web Application in Azure Active Directory (see https://docs.microsoft.com/azure/active-directory/reports-monitoring/concept-reporting-api)
134+
# This script requires the registration of a Web Application in Azure Active Directory:
135+
# https://docs.microsoft.com/azure/active-directory/reports-monitoring/concept-reporting-api
132136
133137
# Constants
134138
$ClientID = "your-client-application-id-here" # Insert your application's Client ID, a GUID (registered by Global Admin)

0 commit comments

Comments
 (0)