Skip to content

Commit f13816e

Browse files
author
Markus Vilcinskas
committed
mon110
1 parent 0f8def2 commit f13816e

File tree

1 file changed

+3
-6
lines changed

1 file changed

+3
-6
lines changed

articles/active-directory/reports-monitoring/howto-view-applied-conditional-access-policies.md

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ ms.collection: M365-identity-device-management
2121

2222
# How to: View applied conditional access policies in the Azure AD sign-in logs
2323

24-
With conditional access policies, you can control, how your users get access to the resources of your Azure tenant. As an tenant admin, you need to be able to determine what impact your conditional access policies on your users’ sign-in have, so that you can take action if necessary. The sign-in logs in Azure AD provide you with the information you need to assess the impact of your policies.
24+
With conditional access policies, you can control, how your users get access to the resources of your Azure tenant. As an tenant admin, you need to be able to determine what impact your conditional access policies have on sign-ins to your tenant, so that you can take action if necessary. The sign-in logs in Azure AD provide you with the information you need to assess the impact of your policies.
2525

2626

2727
This article explains how you can get access to the information about applied conditional access policies.
@@ -42,10 +42,7 @@ Some scenarios require you to get an understanding for how your conditional acce
4242
- **Tenant administrators** who need to verify that conditional access policies have the intended impact on the users of a tenant.
4343

4444

45-
46-
using the Azure Portal, MS Graph, and PowerShell.
47-
48-
45+
You can access the sign-in logs using the Azure Portal, MS Graph, and PowerShell.
4946

5047

5148

@@ -88,7 +85,7 @@ The following built in roles grant permission to view sign-in logs:
8885

8986
## Required permissions for client apps
9087

91-
If you use a client app to pull sign-in logs from Graph, your app needs permissions to receive the appliedConditionalAccessPolicy object from Graph. We recommend assigning Policy.Read.ConditionalAccess because it is the least privileged permission. Any of the following permissions is sufficient for a client app to access applied CA policies in sign-in logs through Graph:
88+
If you use a client app to pull sign-in logs from Graph, your app needs permissions to receive the **appliedConditionalAccessPolicy** object from Graph. As a best practice, assign **Policy.Read.ConditionalAccess** because it is the least privileged permission. Any of the following permissions is sufficient for a client app to access applied CA policies in sign-in logs through Graph:
9289

9390
Policy.Read.ConditionalAccess
9491

0 commit comments

Comments
 (0)