Skip to content

Commit 1e12ad6

Browse files
committed
tech writer pass
1 parent 6c1be3c commit 1e12ad6

File tree

1 file changed

+19
-19
lines changed

1 file changed

+19
-19
lines changed

articles/active-directory/authentication/howto-mfa-mfasettings.md

Lines changed: 19 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ The following fraud alert configuration options are available:
9090
9191
To enable and configure fraud alerts, complete the following steps:
9292

93-
1. Browse to **Azure Active Directory** > **Security** > **MFA** > **Fraud alert**.
93+
1. Go to **Azure Active Directory** > **Security** > **MFA** > **Fraud alert**.
9494
1. Set **Allow users to submit fraud alerts** to **On**.
9595
1. Configure the **Automatically block users who report fraud** or **Code to report fraud during initial greeting** setting as needed.
9696
1. Select **Save**.
@@ -171,17 +171,17 @@ Before you begin, be aware of the following restrictions:
171171

172172
* The supported file formats are .wav and .mp3.
173173
* The file size limit is 1 MB.
174-
* Authentication messages should be shorter than 20 seconds. Messages that are longer than 20 seconds can cause the verification to fail. The user might not respond before the message finishes and the verification times out.
174+
* Authentication messages should be shorter than 20 seconds. Messages that are longer than 20 seconds can cause the verification to fail. If the user doesn't respond before the message finishes, the verification times out.
175175

176176
### Custom message language behavior
177177

178178
When a custom voice message is played to the user, the language of the message depends on the following factors:
179179

180-
* The language of the current user.
180+
* The language of the user.
181181
* The language detected by the user's browser.
182182
* Other authentication scenarios might behave differently.
183183
* The language of any available custom messages.
184-
* This language is chosen by the administrator, when a custom message is added.
184+
* This language is chosen by the administrator when a custom message is added.
185185

186186
For example, if there's only one custom message, and it's in German:
187187

@@ -190,7 +190,7 @@ For example, if there's only one custom message, and it's in German:
190190

191191
### Custom voice message defaults
192192

193-
You can use the following sample scripts to create your own custom messages. These phrases are the defaults if you don't configure your own custom messages:
193+
You can use the following sample scripts to create your own custom messages. These phrases are the defaults if you don't configure your own custom messages.
194194

195195
| Message name | Script |
196196
| --- | --- |
@@ -203,9 +203,9 @@ You can use the following sample scripts to create your own custom messages. The
203203
| Authentication denied retry | Verification denied. |
204204
| Retry (standard) | Thank you for using the Microsoft sign-in verification system. Please press the pound key to finish your verification. |
205205
| Greeting (standard) | Thank you for using the Microsoft sign-in verification system. Please press the pound key to finish your verification. |
206-
| Greeting (PIN) | Thank you for using Microsoft sign-in verification system. Please enter your PIN followed by the pound key to finish your verification. |
206+
| Greeting (PIN) | Thank you for using Microsoft's sign-in verification system. Please enter your PIN followed by the pound key to finish your verification. |
207207
| Fraud greeting (PIN) | Thank you for using Microsoft's sign-in verification system. Please enter your PIN followed by the pound key to finish your verification. If you did not initiate this verification, someone may be trying to access your account. Please press zero pound to submit a fraud alert. This will notify your company's IT team and block further verification attempts. |
208-
| Retry(PIN) | Thank you for using Microsoft's sign-in verification system. Please enter your PIN followed by the pound key to finish your verification. |
208+
| Retry (PIN) | Thank you for using Microsoft's sign-in verification system. Please enter your PIN followed by the pound key to finish your verification. |
209209
| Extension prompt after digits | If already at this extension, press the pound key to continue. |
210210
| Authentication denied | I'm sorry, we cannot sign you in at this time. Please try again later. |
211211
| Activation greeting (standard) | Thank you for using the Microsoft sign-in verification system. Please press the pound key to finish your verification. |
@@ -226,7 +226,7 @@ To use your own custom messages, complete the following steps:
226226

227227
## Multi-factor authentication service settings
228228

229-
Settings for app passwords, trusted IPs, verification options, and remembering multi-factor authentication on trusted devices are available in the service settings. This is a legacy portal. It isn't part of the regular Azure portal.
229+
Settings for app passwords, trusted IPs, verification options, and remembering multi-factor authentication on trusted devices are available in the service settings. This is a legacy portal. It isn't part of the regular Azure AD portal.
230230

231231
You can access service settings from the Azure portal by going to **Azure Active Directory** > **Security** > **MFA** > **Getting started** > **Configure** > **Additional cloud-based MFA settings**. A window or tab opens with additional service settings options.
232232

@@ -248,21 +248,21 @@ If your organization uses the NPS extension to provide multi-factor authenticati
248248

249249
Trusted IP bypass works only from inside the company intranet. If you select the **All Federated Users** option and a user signs in from outside the company intranet, the user has to authenticate by using multi-factor authentication. The process is the same even if the user presents an AD FS claim.
250250

251-
#### End-user experience inside the corporate network
251+
#### User experience inside the corporate network
252252

253253
When the trusted IPs feature is disabled, multi-factor authentication is required for browser flows. App passwords are required for older rich-client applications.
254254

255255
When trusted IPs are used, multi-factor authentication isn't required for browser flows. App passwords aren't required for older rich-client applications if the user hasn't created an app password. After an app password is in use, the password is required.
256256

257-
#### End-user experience outside the corporate network
257+
#### User experience outside the corporate network
258258

259259
Regardless of whether trusted IP are defined, multi-factor authentication is required for browser flows. App passwords are required for older rich-client applications.
260260

261261
#### Enable named locations by using Conditional Access
262262

263263
You can use Conditional Access rules to define named locations by using the following steps:
264264

265-
1. In the Azure portal, search for and select **Azure Active Directory**, and then browse to **Security** > **Conditional Access** > **Named locations**.
265+
1. In the Azure portal, search for and select **Azure Active Directory**, and then go to **Security** > **Conditional Access** > **Named locations**.
266266
1. Select **New location**.
267267
1. Enter a name for the location.
268268
1. Select **Mark as trusted location**.
@@ -273,17 +273,17 @@ You can use Conditional Access rules to define named locations by using the foll
273273

274274
To enable trusted IPs by using Conditional Access policies, complete the following steps:
275275

276-
1. In the Azure portal, search for and select **Azure Active Directory**, and then browse to **Security** > **Conditional Access** > **Named locations**.
276+
1. In the Azure portal, search for and select **Azure Active Directory**, and then go to **Security** > **Conditional Access** > **Named locations**.
277277
1. Select **Configure MFA trusted IPs**.
278278
1. On the **Service Settings** page, under **Trusted IPs**, choose one of these options:
279279

280-
* **For requests from federated users originating from my intranet**: To choose this option, select the check box. All federated users who sign in from the corporate network bypass multi-factor authentication by using a claim that's issued by AD FS. Ensure that AD FS has a rule to add the intranet claim to the appropriate traffic. If the rule doesn't exist, create the following rule in AD FS:
280+
* **For requests from federated users originating from my intranet**: To choose this option, select the checkbox. All federated users who sign in from the corporate network bypass multi-factor authentication by using a claim that's issued by AD FS. Ensure that AD FS has a rule to add the intranet claim to the appropriate traffic. If the rule doesn't exist, create the following rule in AD FS:
281281

282282
`c:[Type== "http://schemas.microsoft.com/ws/2012/01/insidecorporatenetwork"] => issue(claim = c);`
283283

284284
* **For requests from a specific range of public IPs**: To choose this option, enter the IP addresses in the text box, in CIDR notation.
285-
* For IP addresses that are in the range xxx.xxx.xxx.1 through xxx.xxx.xxx.254, use notation like **xxx.xxx.xxx.0/24**.
286-
* For a single IP address, use notation like **xxx.xxx.xxx.xxx/32**.
285+
* For IP addresses that are in the range *xxx.xxx.xxx*.1 through *xxx.xxx.xxx*.254, use notation like ***xxx.xxx.xxx*.0/24**.
286+
* For a single IP address, use notation like ***xxx.xxx.xxx.xxx*/32**.
287287
* Enter up to 50 IP address ranges. Users who sign in from these IP addresses bypass multi-factor authentication.
288288

289289
1. Select **Save**.
@@ -297,7 +297,7 @@ If you don't want to use Conditional Access policies to enable trusted IPs, you
297297
1. Under **multi-factor authentication** at the top of the page, select **service settings**.
298298
1. On the **service settings** page, under **Trusted IPs**, choose one or both of the following options:
299299

300-
* **For requests from federated users on my intranet**: To choose this option, select the check box. All federated users who sign in from the corporate network bypass multi-factor authentication by using a claim that's issued by AD FS. Ensure that AD FS has a rule to add the intranet claim to the appropriate traffic. If the rule doesn't exist, create the following rule in AD FS:
300+
* **For requests from federated users on my intranet**: To choose this option, select the checkbox. All federated users who sign in from the corporate network bypass multi-factor authentication by using a claim that's issued by AD FS. Ensure that AD FS has a rule to add the intranet claim to the appropriate traffic. If the rule doesn't exist, create the following rule in AD FS:
301301

302302
`c:[Type== "http://schemas.microsoft.com/ws/2012/01/insidecorporatenetwork"] => issue(claim = c);`
303303

@@ -321,7 +321,7 @@ The following verification methods are available:
321321
| Notification through mobile app |Sends a push notification to the user's phone or registered device. The user views the notification and selects **Verify** to complete verification. The Microsoft Authenticator app is available for [Windows Phone](https://www.microsoft.com/p/microsoft-authenticator/9nblgggzmcj6), [Android](https://go.microsoft.com/fwlink/?Linkid=825072), and [iOS](https://go.microsoft.com/fwlink/?Linkid=825073). |
322322
| Verification code from mobile app or hardware token |The Microsoft Authenticator app generates a new OATH verification code every 30 seconds. The user enters the verification code into the sign-in interface. The Microsoft Authenticator app is available for [Windows Phone](https://www.microsoft.com/p/microsoft-authenticator/9nblgggzmcj6), [Android](https://go.microsoft.com/fwlink/?Linkid=825072), and [iOS](https://go.microsoft.com/fwlink/?Linkid=825073). |
323323

324-
For more information, see [What authentication and verification methods are available in Azure AD?](concept-authentication-methods.md)
324+
For more information, see [What authentication and verification methods are available in Azure AD?](concept-authentication-methods.md).
325325

326326
#### Enable and disable verification methods
327327

@@ -338,7 +338,7 @@ To enable or disable verification methods, complete the following steps:
338338
The **remember multi-factor authentication** feature lets users bypass subsequent verifications for a specified number of days, after they've successfully signed in to a device by using multi-factor authentication. To enhance usability and minimize the number of times a user has to perform multi-factor authentication on a given device, select a duration of 90 days or more.
339339

340340
> [!IMPORTANT]
341-
> If an account or device is compromised, remembering multi-factor authentication for trusted devices can affect security. If a corporate account becomes compromised or a trusted device is lost or stolen, you should [Revoke multi-factor authentication sessions](howto-mfa-userdevicesettings.md).
341+
> If an account or device is compromised, remembering multi-factor authentication for trusted devices can affect security. If a corporate account becomes compromised or a trusted device is lost or stolen, you should [Revoke MFA Sessions](howto-mfa-userdevicesettings.md).
342342
>
343343
> The revoke action revokes the trusted status from all devices, and the user is required to perform multi-factor authentication again. You can also instruct your users to restore the original multi-factor authentication status on their own devices as noted in [Manage your settings for multi-factor authentication](https://support.microsoft.com/account-billing/change-your-two-step-verification-method-and-settings-c801d5ad-e0fc-4711-94d5-33ad5d4630f7#turn-on-two-factor-verification-prompts-on-a-trusted-device).
344344
@@ -375,4 +375,4 @@ After you enable the **remember multi-factor authentication** feature, users can
375375

376376
## Next steps
377377

378-
To learn more about the available methods in Azure AD Multi-Factor Authentication, see [What authentication and verification methods are available in Azure Active Directory?](concept-authentication-methods.md)
378+
To learn more, see [What authentication and verification methods are available in Azure Active Directory?](concept-authentication-methods.md)

0 commit comments

Comments
 (0)