Skip to content

Commit d6a8464

Browse files
author
Markus Vilcinskas
committed
mon110
1 parent 38a73c1 commit d6a8464

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/active-directory/reports-monitoring/howto-view-applied-conditional-access-policies.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ ms.collection: M365-identity-device-management
2121

2222
# How to: View applied conditional access policies in the Azure AD sign-in logs
2323

24-
With conditional access policies, you can control, how your users get access to the resources of your Azure tenant. As an tenant admin, you need to be able to determine what impact your conditional access policies have on sign-ins to your tenant, so that you can take action if necessary. The sign-in logs in Azure AD provide you with the information you need to assess the impact of your policies.
24+
With conditional access policies, you can control, how your users get access to the resources of your Azure tenant. As a tenant admin, you need to be able to determine what impact your conditional access policies have on sign-ins to your tenant, so that you can take action if necessary. The sign-in logs in Azure AD provide you with the information you need to assess the impact of your policies.
2525

2626

2727
This article explains how you can get access to the information about applied conditional access policies.
@@ -42,7 +42,7 @@ Some scenarios require you to get an understanding for how your conditional acce
4242
- **Tenant administrators** who need to verify that conditional access policies have the intended impact on the users of a tenant.
4343

4444

45-
You can access the sign-in logs using the Azure Portal, MS Graph, and PowerShell.
45+
You can access the sign-in logs using the Azure portal, MS Graph, and PowerShell.
4646

4747

4848

@@ -85,7 +85,7 @@ The following built in roles grant permission to view sign-in logs:
8585

8686
## Permissions for client apps
8787

88-
If you use a client app to pull sign-in logs from Graph, your app needs permissions to receive the **appliedConditionalAccessPolicy** object from Graph. As a best practice, assign **Policy.Read.ConditionalAccess** because it is the least privileged permission. Any of the following permissions is sufficient for a client app to access applied CA policies in sign-in logs through Graph:
88+
If you use a client app to pull sign-in logs from Graph, your app needs permissions to receive the **appliedConditionalAccessPolicy** object from Graph. As a best practice, assign **Policy.Read.ConditionalAccess** because it's the least privileged permission. Any of the following permissions is sufficient for a client app to access applied CA policies in sign-in logs through Graph:
8989

9090
Policy.Read.ConditionalAccess
9191

@@ -117,16 +117,16 @@ The output of this cmdlet contains a **AppliedConditionalAccessPolicies** proper
117117

118118
For more information about this cmdlet, see [Get-MgAuditLogSignIn](https://docs.microsoft.com/powershell/module/microsoft.graph.reports/get-mgauditlogsignin?view=graph-powershell-1.0).
119119

120-
The AzureAD Graph powerShell module does not support viewing applied conditional access policies; only the Microsoft Graph PowerShell module returns applied conditional access policies.
120+
The AzureAD Graph PowerShell module doesn't support viewing applied conditional access policies; only the Microsoft Graph PowerShell module returns applied conditional access policies.
121121

122122
## Confirming access
123123

124124
In the **Conditional Access** tab, you see a list of conditional access policies applied to that sign-in event.
125125

126126

127-
To confirm you have admin access to view applied conditional access policies in the sign in logs, do:
127+
To confirm that you have admin access to view applied conditional access policies in the sign-ins logs, do:
128128

129-
1. Navigate to the Azure Portal.
129+
1. Navigate to the Azure portal.
130130

131131
2. In the top-right corner, select your directory, and then select **Azure Active Directory** in the left navigation pane.
132132

0 commit comments

Comments
 (0)