Skip to content

Commit c2e8d37

Browse files
authored
Merge pull request #106417 from MarkusVi/monitoring89
monitoring89
2 parents c695206 + 28b60cc commit c2e8d37

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/active-directory/reports-monitoring/concept-risky-sign-ins.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.topic: conceptual
1313
ms.tgt_pltfrm: na
1414
ms.workload: identity
1515
ms.subservice: report-monitor
16-
ms.date: 10/28/2019
16+
ms.date: 03/04/2020
1717
ms.author: markvi
1818
ms.reviewer: dhanyahk
1919

@@ -49,15 +49,15 @@ To learn how to assign administrative roles to a user in Azure Active Directory,
4949

5050
All editions of Azure AD provide you with risky sign-ins reports. However, the level of report granularity varies between the editions:
5151

52-
- In the **Azure Active Directory Free and Basic editions**, you get a list of risky sign-ins.
52+
- In the **Azure Active Directory Free edition**, you get a list of risky sign-ins.
5353

5454
- In addition, the **Azure Active Directory Premium 1** edition allows you to examine some of the underlying risk detections that have been detected for each report.
5555

5656
- The **Azure Active Directory Premium 2** edition provides you with the most detailed information about all underlying risk detections and it also enables you to configure security policies that automatically respond to configured risk levels.
5757

58-
## Risky sign-ins report for Azure AD free and basic edition
58+
## Risky sign-ins report for Azure AD free edition
5959

60-
The Azure AD free and basic editions provide you with a list of risky sign-ins that have been detected for your users. Each record contains the following attributes:
60+
The Azure AD free edition provide you with a list of risky sign-ins that have been detected for your users. Each record contains the following attributes:
6161

6262
- **User** - The name of the user that was used during the sign-in operation.
6363
- **IP** - The IP address of the device that was used to connect to Azure Active Directory.

0 commit comments

Comments
 (0)