Skip to content

Commit e140665

Browse files
committed
added note to resolve stale pr
1 parent 7b15c21 commit e140665

File tree

1 file changed

+4
-1
lines changed

1 file changed

+4
-1
lines changed

articles/active-directory/reports-monitoring/concept-all-sign-ins.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.topic: conceptual
99
ms.workload: identity
1010
ms.subservice: report-monitor
11-
ms.date: 11/04/2022
11+
ms.date: 01/05/2023
1212
ms.author: sarahlipsey
1313
ms.reviewer: besiler
1414
ms.collection: M365-identity-device-management
@@ -41,6 +41,9 @@ To access the sign-ins log for a tenant, you must have one of the following role
4141
- Global Reader
4242
- Reports Reader
4343

44+
>[!NOTE]
45+
>You might need conditional access administrator role to see applied conditional access policies in the sign-ins log.
46+
4447
The sign-in activity report is available in [all editions of Azure AD](reference-reports-data-retention.md#how-long-does-azure-ad-store-the-data). If you have an Azure Active Directory P1 or P2 license, you can access the sign-in activity report through the Microsoft Graph API. See [Getting started with Azure Active Directory Premium](../fundamentals/active-directory-get-started-premium.md) to upgrade your Azure Active Directory edition. It will take a couple of days for the data to show up in Graph after you upgrade to a premium license with no data activities before the upgrade.
4548

4649
**To access the Azure AD sign-ins log preview:**

0 commit comments

Comments
 (0)