Skip to content

Commit c4868c0

Browse files
author
Markus Vilcinskas
committed
mon110
1 parent f13816e commit c4868c0

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/active-directory/reports-monitoring/howto-view-applied-conditional-access-policies.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ The following built in roles grant permission to view sign-in logs:
8383
- Reports Reader
8484

8585

86-
## Required permissions for client apps
86+
## Permissions for client apps
8787

8888
If you use a client app to pull sign-in logs from Graph, your app needs permissions to receive the **appliedConditionalAccessPolicy** object from Graph. As a best practice, assign **Policy.Read.ConditionalAccess** because it is the least privileged permission. Any of the following permissions is sufficient for a client app to access applied CA policies in sign-in logs through Graph:
8989

@@ -95,7 +95,7 @@ Policy.Read.All
9595

9696

9797

98-
## Required permissions for PowerShell
98+
## Permissions for PowerShell
9999

100100
Like any other client app, the Microsoft Graph Powershell module needs client permissions to access applied conditional access policies in the sign-in logs. To successfully pull applied conditional access in the sign-in logs, you must consent to the necessary permissions with your administrator account for MS Graph Powershell. As a best practice, consent to:
101101

0 commit comments

Comments
 (0)