You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/roles/permissions-reference.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -931,7 +931,7 @@ This administrator manages federation between Azure AD organizations and externa
931
931
932
932
## Global Administrator
933
933
934
-
Users with this role have access to all administrative features in Azure Active Directory, as well as services that use Azure Active Directory identities like the Microsoft 365 Defender portal, the Microsoft Purview compliance portal, Exchange Online, SharePoint Online, and Skype for Business Online. Furthermore, Global Administrators can [elevate their access](../../role-based-access-control/elevate-access-global-admin.md) to manage all Azure subscriptions and management groups. This allows Global Administrators to get full access to all Azure resources using the respective Azure AD Tenant. The person who signs up for the Azure AD organization becomes a Global Administrator. There can be more than one Global Administrator at your company. Global Administrators can reset the password for any user and all other administrators. A Global Administrator cannot remove their own Global Administrator assignment. This is to prevent a situation where an organization has zero Global Administrators.
934
+
Users with this role have access to all administrative features in Azure Active Directory, as well as services that use Azure Active Directory identities like the Microsoft 365 Defender portal, the Microsoft Purview compliance portal, Exchange Online, SharePoint Online, and Skype for Business Online. Global Administrators can view Directory Activity logs. Furthermore, Global Administrators can [elevate their access](../../role-based-access-control/elevate-access-global-admin.md) to manage all Azure subscriptions and management groups. This allows Global Administrators to get full access to all Azure resources using the respective Azure AD Tenant. The person who signs up for the Azure AD organization becomes a Global Administrator. There can be more than one Global Administrator at your company. Global Administrators can reset the password for any user and all other administrators. A Global Administrator cannot remove their own Global Administrator assignment. This is to prevent a situation where an organization has zero Global Administrators.
935
935
936
936
> [!NOTE]
937
937
> As a best practice, Microsoft recommends that you assign the Global Administrator role to fewer than five people in your organization. For more information, see [Best practices for Azure AD roles](best-practices.md).
@@ -1465,7 +1465,7 @@ Users with this role have global permissions to manage settings within Microsoft
1465
1465
1466
1466
## Knowledge Administrator
1467
1467
1468
-
Users in this role have full access to all knowledge, learning and intelligent features settings in the Microsoft 365 admin center. They have a general understanding of the suite of products, licensing details and has responsibility to control access. Knowledge Administrator can create and manage content, like topics, acronyms and learning resources. Additionally, these users can create content centers, monitor service health, and create service requests.
1468
+
Users in this role have full access to all knowledge, learning and intelligent features settings in the Microsoft 365 admin center. They have a general understanding of the suite of products, licensing details and have responsibility to control access. Knowledge Administrator can create and manage content, like topics, acronyms and learning resources. Additionally, these users can create content centers, monitor service health, and create service requests.
1469
1469
1470
1470
> [!div class="mx-tableFixed"]
1471
1471
> | Actions | Description |
@@ -2403,7 +2403,7 @@ Users with this role **cannot** do the following:
2403
2403
Users with this role can do the following tasks:
2404
2404
2405
2405
- Manage and configure all aspects of Virtual Visits in Bookings in the Microsoft 365 admin center, and in the Teams EHR connector
2406
-
- View usage reports for Virtual Visits in the Teams admin center, Microsoft 365 admin center, and PowerBI
2406
+
- View usage reports for Virtual Visits in the Teams admin center, Microsoft 365 admin center, and Power BI
2407
2407
- View features and settings in the Microsoft 365 admin center, but can't edit any settings
2408
2408
2409
2409
Virtual Visits are a simple way to schedule and manage online and video appointments for staff and attendees. For example, usage reporting can show how sending SMS text messages before appointments can reduce the number of people who don't show up for appointments.
## View elevate access log entries in the Directory Activity logs
337
337
338
-
When access is elevated, an entry is added to the logs. As a Global Administrator in Azure AD, you might want to check when access was elevated and who did it. Elevate access log entries do not appear in the standard activity logs, but instead appear in the directory activity logs. This section describes different ways that you can view the elevate access logs.
338
+
When access is elevated, an entry is added to the logs. As a Global Administrator in Azure AD, you might want to check when access was elevated and who did it. Elevate access log entries do not appear in the standard activity logs, but instead appear in the Directory Activity logs. This section describes different ways that you can view the elevate access log entries.
339
339
340
-
### View elevate access logs using the Azure portal
341
-
342
-
1. Follow the steps earlier in this article to elevate your access.
340
+
### View elevate access log entries using the Azure portal
343
341
344
342
1. Sign in to the [Azure portal](https://portal.azure.com) as a Global Administrator.
345
343
@@ -353,11 +351,7 @@ When access is elevated, an entry is added to the logs. As a Global Administrato
353
351
354
352

355
353
356
-
1. Follow the steps earlier in this article to remove elevated access.
357
-
358
-
### View elevate access logs using Azure CLI
359
-
360
-
1. Follow the steps earlier in this article to elevate your access.
354
+
### View elevate access log entries using Azure CLI
361
355
362
356
1. Use the [az login](/cli/azure/reference-index#az-login) command to sign in as Global Administrator.
363
357
@@ -390,18 +384,14 @@ When access is elevated, an entry is added to the logs. As a Global Administrato
390
384
},
391
385
```
392
386
393
-
1. Follow the steps earlier in this article to remove elevated access.
387
+
### Delegate access to a group to view elevate access log entries using Azure CLI
394
388
395
-
### Delegate access to a group to view elevate access logs using Azure CLI
396
-
397
-
If you want to be able to periodically get the elevate access logs, you can delegate access to a group and then use Azure CLI.
389
+
If you want to be able to periodically get the elevate access log entries, you can delegate access to a group and then use Azure CLI.
398
390
399
391
1. Open **Azure Active Directory** > **Groups**.
400
392
401
393
1. Create a new security group and note the group object ID.
402
394
403
-
1. Follow the steps earlier in this article to elevate your access.
404
-
405
395
1. Use the [az login](/cli/azure/reference-index#az-login) command to sign in as Global Administrator.
406
396
407
397
1. Use the [az role assignment create](/cli/azure/role/assignment#az-role-assignment-create) command to assign the [Reader](built-in-roles.md#reader) role to the group who can only read logs at the directory level, which are found at `Microsoft/Insights`.
@@ -412,9 +402,7 @@ If you want to be able to periodically get the elevate access logs, you can dele
412
402
413
403
1. Add a user who will read logs to the previously created group.
414
404
415
-
1. Follow the steps earlier in this article to remove elevated access.
416
-
417
-
A user in the group can now periodically run the [az rest](/cli/azure/reference-index#az-rest) command to view elevate access logs.
405
+
A user in the group can now periodically run the [az rest](/cli/azure/reference-index#az-rest) command to view elevate access log entries.
418
406
419
407
```azurecli
420
408
az rest --url "https://management.azure.com/providers/Microsoft.Insights/eventtypes/management/values?api-version=2015-04-01&$filter=eventTimestamp ge '2021-09-10T20:00:00Z'" > output.txt
0 commit comments