Skip to content

Commit 0065538

Browse files
authored
Added missing periods
1 parent 1650ffd commit 0065538

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

articles/active-directory/authentication/howto-registration-mfa-sspr-combined.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -52,8 +52,8 @@ For more information about creating trusted locations in Conditional Access, see
5252

5353
The following policy applies to all selected users that attempt to register using the combined registration experience, and blocks access unless they are connecting from a location marked as trusted network.
5454

55-
1. In the **Azure portal**, browse to **Azure Active Directory** > **Security** > **Conditional Access**
56-
1. Select **+ New policy**
55+
1. In the **Azure portal**, browse to **Azure Active Directory** > **Security** > **Conditional Access**.
56+
1. Select **+ New policy**.
5757
1. Enter a name for this policy, such as *Combined Security Info Registration on Trusted Networks*.
5858
1. Under **Assignments**, select **Users and groups**. Choose the users and groups you want this policy to apply to, then select **Done**.
5959

@@ -65,13 +65,13 @@ The following policy applies to all selected users that attempt to register usin
6565
![Create a conditional access policy to control security info registration](media/howto-registration-mfa-sspr-combined/require-registration-from-trusted-location.png)
6666

6767
1. Under **Conditions** > **Locations**, configure the following options:
68-
1. Configure **Yes**
69-
1. Include **Any location**
70-
1. Exclude **All trusted locations**
68+
1. Configure **Yes**.
69+
1. Include **Any location**.
70+
1. Exclude **All trusted locations**.
7171
1. Select **Done** on the *Locations* window, then select **Done** on the *Conditions* window.
72-
1. Under **Access controls** > **Grant**, choose **Block access**, then **Select**
73-
1. Set **Enable policy** to **On**
74-
1. To finalize the policy, select **Create**
72+
1. Under **Access controls** > **Grant**, choose **Block access**, then **Select**.
73+
1. Set **Enable policy** to **On**.
74+
1. To finalize the policy, select **Create**.
7575

7676
## Next steps
7777

0 commit comments

Comments
 (0)