Skip to content

Commit 913d781

Browse files
authored
Merge pull request #250584 from omondiatieno/govern-monitor
govern-monitor - UI updates
2 parents 764add6 + eb9e87d commit 913d781

File tree

1 file changed

+7
-9
lines changed

1 file changed

+7
-9
lines changed

articles/active-directory/manage-apps/tutorial-govern-monitor.md

Lines changed: 7 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.author: jomondi
77
ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.topic: tutorial
10-
ms.date: 07/19/2022
10+
ms.date: 09/07/2023
1111
ms.reviewer: saibandaru
1212
ms.custom: enterprise-apps
1313

@@ -29,7 +29,7 @@ Using the information in this tutorial, an administrator of the application lear
2929
## Prerequisites
3030

3131
- An Azure account with an active subscription. If you don't already have one, [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
32-
- One of the following roles: Global Administrator, Privileged Role Administrator, Cloud Application Administrator, or Application Administrator.
32+
- One of the following roles: Global Administrator, Identity Governance Administrator, Privileged Role Administrator, Cloud Application Administrator, or Application Administrator.
3333
- An enterprise application that has been configured in your Azure AD tenant.
3434

3535
## Create an access review
@@ -41,9 +41,8 @@ The administrator wants to make sure that users or guests have appropriate acces
4141

4242
To create an access review:
4343

44-
1. Sign in to the [Azure portal](https://portal.azure.com) with one of the roles listed in the prerequisites.
45-
1. Go to **Azure Active Directory**, and then select **Identity Governance**.
46-
1. On the left menu, select **Access reviews**.
44+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
45+
1. Browse to **Identity** > **Identity Governance** > **Access reviews**.
4746
1. Select **New access review** to create a new access review.
4847
1. In **Select what to review**, select **Applications**.
4948
1. Select **+ Select application(s)**, select the application, and then choose **Select**.
@@ -75,8 +74,7 @@ If you've assigned guests as reviewers and they haven't accepted their invitatio
7574

7675
You can track the progress of access reviews as they are completed.
7776

78-
1. Go to **Azure Active Directory**, and then select **Identity Governance**.
79-
1. In the left menu, select **Access reviews**.
77+
1. Go to **Identity** > **Identity Governance** > **Access reviews**.
8078
1. In the list, select the access review you created.
8179
1. On the **Overview** page, check the progress of the access review.
8280

@@ -86,7 +84,7 @@ The **Results** page provides information on each user under review in the insta
8684

8785
The audit logs report combines several reports around application activities into a single view for context-based reporting. For more information, see [Audit logs in Azure Active Directory](../reports-monitoring/concept-audit-logs.md).
8886

89-
To access the audit logs report, select **Audit logs** from the **Activity** section of the Azure Active Directory page.
87+
To access the audit logs report, go to **Identity** > **Monitoring & health** > **Audit logs**.
9088

9189
The audit logs report consolidates the following reports:
9290

@@ -102,7 +100,7 @@ The audit logs report consolidates the following reports:
102100

103101
The Sign-ins view includes all user sign-ins, and the Application Usage report. You also can view application usage information in the Manage section of the Enterprise applications overview. For more information, see [Sign-in logs in Azure Active Directory](../reports-monitoring/concept-sign-ins.md)
104102

105-
To access the sign-in logs report, select **Sign-ins** from the **Monitoring** section of the Azure Active Directory blade.
103+
To access the sign-in logs report, go to **Identity** > **Monitoring & health** > **Sign-in logs**.
106104

107105
## Send logs to Azure Monitor
108106

0 commit comments

Comments
 (0)