Skip to content

Commit 0a0b896

Browse files
authored
Merge pull request #94124 from shashishailaj/patch-53
(Azure CXP) Doc Update
2 parents ae52a25 + 19efbc7 commit 0a0b896

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/active-directory/conditional-access/untrusted-networks.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,10 +44,10 @@ With Azure AD Conditional Access, you can address this requirement with a single
4444

4545
The challenge of this scenario is to translate *access from an untrusted network location* into a Conditional Access condition. In a Conditional Access policy, you can configure the [locations condition](location-condition.md) to address scenarios that are related to network locations. The locations condition enables you to select named locations, which are logical groupings of IP address ranges, countries and regions.
4646

47-
Typically, your organization owns one or more address ranges, for example, 199.30.16.0 - 199.30.16.24.
47+
Typically, your organization owns one or more address ranges, for example, 199.30.16.0 - 199.30.16.15.
4848
You can configure a named location by:
4949

50-
- Specifying this range (199.30.16.0/24)
50+
- Specifying this range (199.30.16.0/28)
5151
- Assigning a descriptive name such as **Corporate Network**
5252

5353
Instead of trying to define what all locations are that are not trusted, you can:

0 commit comments

Comments
 (0)