Skip to content

Commit 13cba99

Browse files
authored
Merge pull request #77525 from MicrosoftDocs/master
Merge master to live 3:00 AM
2 parents cfbc8db + 34cabfe commit 13cba99

File tree

105 files changed

+1751
-510
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

105 files changed

+1751
-510
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17369,6 +17369,11 @@
1736917369
"redirect_url": "/azure/active-directory/hybrid/how-to-connect-sync-best-practices-changing-default-configuration",
1737017370
"redirect_document_id": false
1737117371
},
17372+
{
17373+
"source_path": "articles/active-directory/conditional-access/baseline-protection.md",
17374+
"redirect_url": "/azure/active-directory/conditional-access/concept-baseline-protection",
17375+
"redirect_document_id": true
17376+
},
1737217377
{
1737317378
"source_path": "articles/active-directory/connect/active-directory-aadconnectsync-change-addsacct-pass.md",
1737417379
"redirect_url": "/azure/active-directory/hybrid/how-to-connect-sync-change-addsacct-pass",

articles/active-directory/conditional-access/TOC.yml

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,8 +19,8 @@
1919
- name: Concepts
2020
expanded: false
2121
items:
22-
- name: Baseline Protection
23-
href: baseline-protection.md
22+
- name: Baseline protection policies
23+
href: concept-baseline-protection.md
2424
- name: Conditions
2525
href: conditions.md
2626
- name: Location conditions
@@ -38,6 +38,16 @@
3838
href: plan-conditional-access.md
3939
- name: Best practices
4040
href: best-practices.md
41+
- name: Baseline policies
42+
items:
43+
- name: Require MFA for admins
44+
href: howto-baseline-protect-administrators.md
45+
- name: End user protection
46+
href: howto-baseline-protect-end-users.md
47+
- name: Block legacy authentication
48+
href: howto-baseline-protect-legacy-auth.md
49+
- name: Require MFA for service management
50+
href: howto-baseline-protect-azure.md
4151
- name: Block legacy authentication
4252
href: block-legacy-authentication.md
4353
- name: Migrate classic policies

articles/active-directory/conditional-access/baseline-protection.md

Lines changed: 0 additions & 85 deletions
This file was deleted.
Lines changed: 99 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,99 @@
1+
---
2+
title: Conditional access baseline protection policies - Azure Active Directory
3+
description: Baseline conditional access policies to protect organizations from common attacks
4+
5+
services: active-directory
6+
ms.service: active-directory
7+
ms.subservice: conditional-access
8+
ms.topic: conceptual
9+
ms.date: 05/16/2019
10+
11+
ms.author: joflore
12+
author: MicrosoftGuyJFlo
13+
manager: daveba
14+
ms.reviewer: calebb, rogoya
15+
16+
ms.collection: M365-identity-device-management
17+
---
18+
# What are baseline policies?
19+
20+
Baseline policies are a set of predefined policies that help protect organizations against many common attacks. These common attacks can include password spray, replay, and phishing. Baseline policies are available in all editions of Azure AD. Microsoft is making these baseline protection policies available to everyone because identity-based attacks have been on the rise over the last few years. The goal of these four policies is to ensure that all organizations have a baseline level of security enabled at no extra cost.
21+
22+
Managing customized conditional access policies requires an Azure AD Premium license.
23+
24+
## Baseline policies
25+
26+
![Conditional access baseline policies in the Azure portal](./media/concept-baseline-protection/conditional-access-baseline-policies.png)
27+
28+
There are four baseline policies that organizations can enable:
29+
30+
* [Require MFA for admins](howto-baseline-protect-administrators.md)
31+
* [End user protection (preview)](howto-baseline-protect-end-users.md)
32+
* [Block legacy authentication (preview)](howto-baseline-protect-legacy-auth.md)
33+
* [Require MFA for service management (preview)](howto-baseline-protect-azure.md)
34+
35+
All four of these policies will impact legacy authentication flows like POP, IMAP, and older Office desktop clients.
36+
37+
### Require MFA for admins
38+
39+
Due to the power and access that administrator accounts have, you should treat them with special care. One common method to improve the protection of privileged accounts is to require a stronger form of account verification when they are used to sign in. In Azure Active Directory, you can get a stronger account verification by requiring administrators to register for and use Azure Multi-Factor Authentication.
40+
41+
[Require MFA for admins](howto-baseline-protect-administrators.md) is a baseline policy that requires multi-factor authentication (MFA) for the following directory roles, considered to be the most privileged Azure AD roles:
42+
43+
* Global administrator
44+
* SharePoint administrator
45+
* Exchange administrator
46+
* Conditional access administrator
47+
* Security administrator
48+
* Helpdesk administrator / Password administrator
49+
* Billing administrator
50+
* User administrator
51+
52+
If your organization has these accounts in use in scripts or code, consider replacing them with [managed identities](../managed-identities-azure-resources/overview.md). As a temporary workaround, you can exclude specific user accounts from the baseline policy.
53+
54+
### End user protection (preview)
55+
56+
High privileged administrators aren’t the only ones targeted in attacks. Bad actors tend to target normal users. After gaining access, these bad actors can request access to privileged information on behalf of the original account holder or download the entire directory and perform a phishing attack on your whole organization. One common method to improve the protection for all users is to require a stronger form of account verification when a risky sign-in is detected.
57+
58+
**End user protection (preview)** is a baseline policy that protects all users in a directory. Enabling this policy requires all users to register for Azure Multi-Factor Authentication within 14 days. Once registered, users will be prompted for MFA only during risky sign-in attempts. Compromised user accounts are blocked until password reset and risk dismissal.
59+
60+
### Block legacy authentication (preview)
61+
62+
Legacy authentication protocols (ex: IMAP, SMTP, POP3) are protocols normally used by older mail clients to authenticate. Legacy protocols do not support multi-factor authentication. Even if you have a policy requiring multi-factor authentication for your directory, a bad actor can authenticate using one of these legacy protocols and bypass multi-factor authentication.
63+
64+
The best way to protect your account from malicious authentication requests made by legacy protocols is to block them.
65+
66+
The **Block legacy authentication (preview)** baseline policy blocks authentication requests that are made using legacy protocols. Modern authentication must be used to successfully sign in for all users. Used in conjunction with the other baseline policies, requests coming from legacy protocols will be blocked. In addition, all users will be required to MFA whenever required. This policy does not block Exchange ActiveSync.
67+
68+
### Require MFA for service management (preview)
69+
70+
Organizations use a variety of Azure services and manage them from Azure Resource Manager based tools like:
71+
72+
* Azure portal
73+
* Azure PowerShell
74+
* Azure CLI
75+
76+
Using any of these tools to perform resource management is a highly privileged action. These tools can alter subscription-wide configurations, such as service settings and subscription billing.
77+
78+
To protect privileged actions, this **Require MFA for service management (preview)** policy will require multi-factor authentication for any user accessing Azure portal, Azure PowerShell, or Azure CLI.
79+
80+
## Enable a baseline policy
81+
82+
To enable a baseline policy:
83+
84+
1. Sign in to the **Azure portal** as global administrator, security administrator, or conditional access administrator.
85+
1. Browse to **Azure Active Directory** > **Conditional Access**.
86+
1. In the list of policies, select a baseline policy you’d like to enable.
87+
1. Set **Enable policy** to **On**.
88+
1. Click Save.
89+
90+
## Next steps
91+
92+
For more information, see:
93+
94+
* [Five steps to securing your identity infrastructure](../../security/azure-ad-secure-steps.md)
95+
* [What is conditional access in Azure Active Directory?](overview.md)
96+
* [Require MFA for admins](howto-baseline-protect-administrators.md)
97+
* [End user protection (preview)](howto-baseline-protect-end-users.md)
98+
* [Block legacy authentication (preview)](howto-baseline-protect-legacy-auth.md)
99+
* [Require MFA for service management (preview)](howto-baseline-protect-azure.md)
Lines changed: 78 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,78 @@
1+
---
2+
title: Baseline policy Require MFA for admins - Azure Active Directory
3+
description: Conditional access policy to require multi-factor authentication for administrators
4+
5+
services: active-directory
6+
ms.service: active-directory
7+
ms.subservice: conditional-access
8+
ms.topic: conceptual
9+
ms.date: 05/16/2019
10+
11+
ms.author: joflore
12+
author: MicrosoftGuyJFlo
13+
manager: daveba
14+
ms.reviewer: calebb, rogoya
15+
16+
ms.collection: M365-identity-device-management
17+
---
18+
# Baseline policy: Require MFA for admins
19+
20+
Users with access to privileged accounts have unrestricted access to your environment. Due to the power these accounts have, you should treat them with special care. One common method to improve the protection of privileged accounts is to require a stronger form of account verification when they are used to sign-in. In Azure Active Directory, you can get a stronger account verification by requiring multi-factor authentication (MFA).
21+
22+
**Require MFA for admins** is a [baseline policy](concept-baseline-protection.md) that requires MFA every time one of the following privileged administrator roles signs in:
23+
24+
* Global administrator
25+
* SharePoint administrator
26+
* Exchange administrator
27+
* Conditional access administrator
28+
* Security administrator
29+
* Helpdesk administrator / Password administrator
30+
* Billing administrator
31+
* User administrator
32+
33+
Upon enabling the Require MFA for admins policy, the above nine administrator roles will be required to register for MFA using the Authenticator App. Once MFA registration is complete, administrators will need to perform MFA every single time they sign-in.
34+
35+
![Require MFA for admins baseline policy](./media/howto-baseline-protect-administrators/baseline-policy-require-mfa-for-admins.png)
36+
37+
## Deployment considerations
38+
39+
Because the **Require MFA for admins** policy applies to all critical administrators, several considerations need to be made to ensure a smooth deployment. These considerations include identifying users and service principles in Azure AD that cannot or should not perform MFA, as well as applications and clients used by your organization that do not support modern authentication.
40+
41+
### Legacy protocols
42+
43+
Legacy authentication protocols (IMAP, SMTP, POP3, etc.) are used by mail clients to make authentication requests. These protocols do not support MFA. Most of the account compromises seen by Microsoft are caused by bad actors performing attacks against legacy protocols attempting to bypass MFA. To ensure that MFA is required when logging into an administrative account and bad actors aren’t able to bypass MFA, this policy blocks all authentication requests made to administrator accounts from legacy protocols.
44+
45+
> [!WARNING]
46+
> Before you enable this policy, make sure your administrators aren’t using legacy authentication protocols. See the article [How to: Block legacy authentication to Azure AD with conditional access](howto-baseline-protect-legacy-auth.md#identify-legacy-authentication-use) for more information.
47+
48+
### User exclusions
49+
50+
This baseline policy provides you the option to exclude users. Before enabling the policy for your tenant, we recommend excluding the following accounts:
51+
52+
* **Emergency access** or **break-glass** accounts to prevent tenant-wide account lockout. In the unlikely scenario all administrators are locked out of your tenant, your emergency-access administrative account can be used to log into the tenant take steps to recover access.
53+
* More information can be found in the article, [Manage emergency access accounts in Azure AD](../users-groups-roles/directory-emergency-access.md).
54+
* **Service accounts** and **service principles**, such as the Azure AD Connect Sync Account. Service accounts are non-interactive accounts that are not tied to any particular user. They are normally used by back-end services and allow programmatic access to applications. Service accounts should be excluded since MFA can’t be completed programmatically.
55+
* If your organization has these accounts in use in scripts or code, consider replacing them with [managed identities](../managed-identities-azure-resources/overview.md). As a temporary workaround, you can exclude these specific accounts from the baseline policy.
56+
* Users who do not have or will not be able to use a smart phone.
57+
* This policy requires administrators to register for MFA using the Microsoft Authenticator app.
58+
59+
## Enable the baseline policy
60+
61+
The policy **Baseline policy: Require MFA for admins** comes pre-configured and will show up at the top when you navigate to the Conditional Access blade in Azure portal.
62+
63+
To enable this policy and protect your administrators:
64+
65+
1. Sign in to the **Azure portal** as global administrator, security administrator, or conditional access administrator.
66+
1. Browse to **Azure Active Directory** > **Conditional Access**.
67+
1. In the list of policies, select **Baseline policy: Require MFA for admins**.
68+
1. Set **Enable policy** to **Use policy immediately**.
69+
1. Add any user exclusions by clicking on **Users** > **Select excluded users** and choosing the users that need to be excluded. Click **Select** then **Done**.
70+
1. Click **Save**.
71+
72+
## Next steps
73+
74+
For more information, see:
75+
76+
* [Conditional access baseline protection policies](concept-baseline-protection.md)
77+
* [Five steps to securing your identity infrastructure](../../security/azure-ad-secure-steps.md)
78+
* [What is conditional access in Azure Active Directory?](overview.md)

0 commit comments

Comments
 (0)