Skip to content

Commit d740a3a

Browse files
Merge pull request #226222 from shlipsey3/reports-backlog-items-020323
reports-backlog-items
2 parents bb9293b + 3128efe commit d740a3a

File tree

2 files changed

+21
-43
lines changed

2 files changed

+21
-43
lines changed

articles/active-directory/reports-monitoring/how-to-view-applied-conditional-access-policies.md

Lines changed: 19 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.topic: how-to
1010
ms.workload: identity
1111
ms.subservice: report-monitor
12-
ms.date: 10/31/2022
12+
ms.date: 02/03/2023
1313
ms.author: sarahlipsey
1414
ms.reviewer: besiler
1515

@@ -32,41 +32,30 @@ As an Azure AD administrator, you can use the sign-in logs to:
3232

3333
Some scenarios require you to get an understanding of how your Conditional Access policies were applied to a sign-in event. Common examples include:
3434

35-
- *Helpdesk administrators* who need to look at applied Conditional Access policies to understand if a policy is the root cause of a ticket that a user opened.
35+
- Helpdesk administrators who need to look at applied Conditional Access policies to understand if a policy is the root cause of a ticket that a user opened.
3636

37-
- *Tenant administrators* who need to verify that Conditional Access policies have the intended effect on the users of a tenant.
37+
- Tenant administrators who need to verify that Conditional Access policies have the intended effect on the users of a tenant.
3838

3939
You can access the sign-in logs by using the Azure portal, Microsoft Graph, and PowerShell.
4040

4141
## Required administrator roles
4242

43-
To see applied Conditional Access policies in the sign-in logs, administrators must have permissions to view both the logs and the policies.
43+
To see applied Conditional Access policies in the sign-in logs, administrators must have permissions to view *both* the logs and the policies. The least privileged built-in role that grants *both* permissions is *Security Reader*. As a best practice, your Global Administrator should add the Security Reader role to the related administrator accounts.
4444

45-
The least privileged built-in role that grants both permissions is *Security Reader*. As a best practice, your global administrator should add the Security Reader role to the related administrator accounts.
46-
47-
The following built-in roles grant permissions to read Conditional Access policies:
45+
The following built-in roles grant permissions to *read Conditional Access policies*:
4846

4947
- Global Administrator
50-
5148
- Global Reader
52-
5349
- Security Administrator
54-
5550
- Security Reader
56-
5751
- Conditional Access Administrator
5852

59-
60-
The following built-in roles grant permission to view sign-in logs:
53+
The following built-in roles grant permission to *view sign-in logs*:
6154

6255
- Global Administrator
63-
6456
- Security Administrator
65-
6657
- Security Reader
67-
6858
- Global Reader
69-
7059
- Reports Reader
7160

7261
## Permissions for client apps
@@ -76,9 +65,7 @@ If you use a client app to pull sign-in logs from Microsoft Graph, your app need
7665
Any of the following permissions is sufficient for a client app to access applied certificate authority (CA) policies in sign-in logs through Microsoft Graph:
7766

7867
- `Policy.Read.ConditionalAccess`
79-
8068
- `Policy.ReadWrite.ConditionalAccess`
81-
8269
- `Policy.Read.All`
8370

8471
## Permissions for PowerShell
@@ -89,37 +76,28 @@ Like any other client app, the Microsoft Graph PowerShell module needs client pe
8976
- `AuditLog.Read.All`
9077
- `Directory.Read.All`
9178

92-
These permissions are the least privileged permissions with the necessary access.
93-
94-
To consent to the necessary permissions, use:
95-
96-
`Connect-MgGraph -Scopes Policy.Read.ConditionalAccess, AuditLog.Read.All, Directory.Read.All`
97-
98-
To view the sign-in logs, use:
79+
The following permissions are the least privileged permissions with the necessary access:
9980

100-
`Get-MgAuditLogSignIn`
81+
- To consent to the necessary permissions: `Connect-MgGraph -Scopes Policy.Read.ConditionalAccess, AuditLog.Read.All, Directory.Read.All`
82+
- To view the sign-in logs: `Get-MgAuditLogSignIn`
10183

10284
For more information about this cmdlet, see [Get-MgAuditLogSignIn](/powershell/module/microsoft.graph.reports/get-mgauditlogsignin).
10385

10486
The Azure AD Graph PowerShell module doesn't support viewing applied Conditional Access policies. Only the Microsoft Graph PowerShell module returns applied Conditional Access policies.
10587

106-
## Confirming access
107-
108-
On the **Conditional Access** tab, you see a list of Conditional Access policies applied to that sign-in event.
109-
110-
To confirm that you have admin access to view applied Conditional Access policies in the sign-in logs:
111-
112-
1. Go to the Azure portal.
113-
114-
2. In the upper-right corner, select your directory, and then select **Azure Active Directory** on the left pane.
88+
## View Conditional Access policies in Azure AD sign-in logs
11589

116-
3. In the **Monitoring** section, select **Sign-in logs**.
90+
The activity details of sign-in logs contain several tabs. The **Conditional Access** tab lists the Conditional Access policies applied to that sign-in event.
11791

118-
4. Select an item in the sign-in table to open the **Activity Details: Sign-ins context** pane.
92+
1. Sign in to the [Azure portal](https://portal.azure.com) using the Security Reader role.
93+
1. In the **Monitoring** section, select **Sign-in logs**.
94+
1. Select a sign-in item from the table to open the **Activity Details: Sign-ins context** pane.
95+
1. Select the **Conditional Access** tab.
11996

120-
5. Select the **Conditional Access** tab on the context pane. If your screen is small, you might need to select the ellipsis (**...**) to see all tabs on the context pane.
97+
If you don't see the Conditional Access policies, confirm you're using a role that provides access to both the sign-in logs and the Conditional Access policies.
12198

12299
## Next steps
123100

124-
* [Sign-in error code reference](./concept-sign-ins.md)
125-
* [Sign-in report overview](concept-sign-ins.md)
101+
* [Troubleshoot sign-in problems](../conditional-access/troubleshoot-conditional-access.md#azure-ad-sign-in-events)
102+
* [Review the Conditional Access sign-in logs FAQs](reports-faq.yml#conditional-access)
103+
* [Learn about the sign-in logs](concept-sign-ins.md)

articles/active-directory/reports-monitoring/overview-reports.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.topic: overview
1010
ms.workload: identity
1111
ms.subservice: report-monitor
12-
ms.date: 11/01/2022
12+
ms.date: 02/03/2023
1313
ms.author: sarahlipsey
1414
ms.reviewer: sarbar
1515

@@ -70,6 +70,6 @@ In addition to the user interface, Azure AD also provides you with [programmatic
7070

7171
## Next steps
7272

73-
- [Risky sign-ins report](../identity-protection/overview-identity-protection.md)
73+
- [Risky sign-ins report](../identity-protection/howto-identity-protection-investigate-risk.md#risky-sign-ins)
7474
- [Audit logs report](concept-audit-logs.md)
7575
- [Sign-ins logs report](concept-sign-ins.md)

0 commit comments

Comments
 (0)