Skip to content

Commit ec62b47

Browse files
Merge pull request #251558 from shlipsey3/rebrand-updates-091423
rebrand-updates-091423
2 parents cdfd322 + db9626e commit ec62b47

19 files changed

+101
-328
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5290,6 +5290,11 @@
52905290
"redirect_url": "/azure/active-directory/reports-monitoring/howto-customize-filter-logs",
52915291
"redirect_document_id": true
52925292
},
5293+
{
5294+
"source_path_from_root": "/articles/active-directory/reports-monitoring/tutorial-azure-monitor-stream-logs-to-event-hub.md",
5295+
"redirect_url": "/azure/active-directory/reports-monitoring/howto-stream-logs-to-event-hub",
5296+
"redirect_document_id": false
5297+
},
52935298
{
52945299
"source_path_from_root": "/articles/active-directory/reports-monitoring/reference-basic-info-sign-in-logs.md",
52955300
"redirect_url": "/azure/active-directory/reports-monitoring/concept-sign-in-log-activity-details",

articles/active-directory/reports-monitoring/howto-access-activity-logs.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,8 +36,8 @@ The required roles and licenses may vary based on the report. Global Administrat
3636

3737
| Log / Report | Roles | Licenses |
3838
|--|--|--|
39-
| Audit | Report Reader<br>Security Reader<br>Security Administrator<br>Global Reader | All editions of Azure AD |
40-
| Sign-ins | Report Reader<br>Security Reader<br>Security Administrator<br>Global Reader | All editions of Azure AD |
39+
| Audit | Reports Reader<br>Security Reader<br>Security Administrator<br>Global Reader | All editions of Azure AD |
40+
| Sign-ins | Reports Reader<br>Security Reader<br>Security Administrator<br>Global Reader | All editions of Azure AD |
4141
| Provisioning | Same as audit and sign-ins, plus<br>Security Operator<br>Application Administrator<br>Cloud App Administrator<br>A custom role with `provisioningLogs` permission | Premium P1/P2 |
4242
| Usage and insights | Security Reader<br>Reports Reader<br> Security Administrator | Premium P1/P2 |
4343
| Identity Protection* | Security Administrator<br>Security Operator<br>Security Reader<br>Global Reader | Azure AD Free/Microsoft 365 Apps<br>Azure AD Premium P1/P2 |

articles/active-directory/reports-monitoring/howto-troubleshoot-sign-in-errors.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.topic: how-to
1010
ms.workload: identity
1111
ms.subservice: report-monitor
12-
ms.date: 08/24/2023
12+
ms.date: 09/14/2023
1313
ms.author: sarahlipsey
1414
ms.reviewer: dhanyahk
1515
---
@@ -29,7 +29,7 @@ In addition, the sign-ins logs can also help you troubleshoot sign-in failures f
2929
You need:
3030

3131
* An Azure AD tenant with a Premium P1/P2 license.
32-
* A user with the **Global Administrator**, **Security Administrator**, **Security Reader**, or **Reports Reader** role for the tenant.
32+
* A user with the **Reports Reader**, **Security Reader**, **Security Administrator**, or **Global Administrator** role for the tenant.
3333
* In addition, any user can access their own sign-ins from https://mysignins.microsoft.com.
3434

3535
## Gather sign-in details

0 commit comments

Comments
 (0)