Skip to content

Commit d6b2ac6

Browse files
committed
merge-suggestions
1 parent 13de5cb commit d6b2ac6

File tree

1 file changed

+5
-11
lines changed

1 file changed

+5
-11
lines changed

articles/active-directory/reports-monitoring/howto-configure-prerequisites-for-reporting-api.md

Lines changed: 5 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ To access the Azure AD reporting API, you must grant your app *Read directory da
7373

7474
![Screenshot shows the Reporting API Application API permissions page where you can select Grant admin consent.](./media/howto-configure-prerequisites-for-reporting-api/api-permissions-grant-consent.png)
7575

76-
## Access the reporting API through Microsoft Graph
76+
## Access reports using Microsoft Graph Explorer
7777

7878
Once you have the app registration configured, you can run activity log queries in Microsoft Graph.
7979

@@ -85,7 +85,7 @@ Once you have the app registration configured, you can run activity log queries
8585

8686
![Screenshot of an activity log GET query in Microsoft Graph.](./media/howto-configure-prerequisites-for-reporting-api/graph-sample-get-query.png)
8787

88-
## Access the reporting API through PowerShell
88+
## Access reports using Microsoft Graph PowerShell
8989

9090
To use PowerShell to access the Azure AD reporting API, you'll need to gather a few configuration settings. These settings were created as a part of the [app registration process](#register-an-azure-ad-application).
9191

@@ -107,28 +107,22 @@ Next you'll authenticate with the configuration settings you just gathered. Open
107107
Connect-MgGraph -ClientID YOUR_APP_ID -TenantId YOUR_TENANT_ID -CertificateName YOUR_CERT_SUBJECT ## Or -CertificateThumbprint instead of -CertificateName
108108
```
109109

110-
### API endpoints and Microsoft Graph PowerShell cmdlets
111-
112-
To get started, use the following endpoints and cmdlets.
113-
114110
Microsoft Graph PowerShell cmdlets:
115111

116112
- **Audit logs:** `Get-MgAuditLogDirectoryAudit`
117113
- **Sign-in logs:** `Get-MgAuditLogSignIn`
118114
- **Provisioning logs:** `Get-MgAuditLogProvisioning`
119115
- Explore the full list of [reporting-related Microsoft Graph PowerShell cmdlets](/powershell/module/microsoft.graph.reports).
120116

121-
Microsoft Graph API endpoints:
122-
- **Audit logs:** `https://graph.microsoft.com/v1.0/auditLogs/directoryAudits`
123-
- **Sign-in logs:** `https://graph.microsoft.com/v1.0/auditLogs/signIns`
124-
125117
Programmatic access APIs:
126118
- **Security detections:** [Identity Protection risk detections API](/graph/api/resources/identityprotection-root)
127119
- **Tenant provisioning events:** [Provisioning logs API](/graph/api/resources/provisioningobjectsummary)
128120

129121
### Troubleshoot errors in Azure Active Directory reporting API
130122

131-
**500 HTTP internal server error while accessing Microsoft Graph V2 endpoint**: We don't currently support the Microsoft Graph v2 endpoint - make sure to access the activity logs using the Microsoft Graph v1 endpoint.
123+
**500 HTTP internal server error while accessing Microsoft Graph beta endpoint**: We don't currently support the Microsoft Graph beta endpoint - make sure to access the activity logs using the Microsoft Graph v1.0 endpoint.
124+
- GET `https://graph.microsoft.com/v1.0/auditLogs/directoryAudits`
125+
- GET `https://graph.microsoft.com/v1.0/auditLogs/signIns`
132126

133127
**Error: Neither tenant is B2C or tenant doesn't have premium license**: Accessing sign-in reports requires an Azure Active Directory premium 1 (P1) license. If you see this error message while accessing sign-ins, make sure that your tenant is licensed with an Azure AD P1 license.
134128

0 commit comments

Comments
 (0)