Skip to content

Commit fdca77b

Browse files
authored
Merge pull request #87703 from curtand/ultravox0905
Ultravox0905 new perms
2 parents ef84756 + f3a6862 commit fdca77b

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/active-directory/users-groups-roles/directory-emergency-access.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -75,14 +75,14 @@ Organizations should monitor sign-in and audit log activity from the emergency a
7575

7676
1. Sign in to the [Azure portal](https://portal.azure.com) with an account assigned to the User administrator role.
7777
1. Select **Azure Active Directory** > **Users**.
78-
1. Search for the break glass account and select the user’s name.
78+
1. Search for the break-glass account and select the user’s name.
7979
1. Copy and save the Object ID attribute so that you can use it later.
80-
1. Repeat previous steps for second break glass account.
80+
1. Repeat previous steps for second break-glass account.
8181

8282
### Create an alert rule
8383

84-
1. Sign in to the [Azure portal](https://portal.azure.com) with an account assigned to the XXXX role.
85-
1. Select **All services**", enter "log analytics" and select **Log Analytics workspaces**.
84+
1. Sign in to the [Azure portal](https://portal.azure.com) with an account assigned to the Monitoring Contributor role in Azure Monitor.
85+
1. Select **All services**", enter "log analytics" in Search and then select **Log Analytics workspaces**.
8686
1. Select a workspace.
8787
1. In your workspace, select **Alerts** > **New alert rule**.
8888
1. Under **Resource**, verify that the subscription is the one with which you want to associate the alert rule.

0 commit comments

Comments
 (0)