Skip to content

Commit 210c419

Browse files
BuildFixes
1 parent d260776 commit 210c419

File tree

6 files changed

+14
-13
lines changed

6 files changed

+14
-13
lines changed

articles/active-directory/conditional-access/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -88,6 +88,8 @@
8888
href: howto-policy-persistent-browser-session.md
8989
- name: Require compliant device, hybrid joined, or MFA for users
9090
href: howto-conditional-access-policy-compliant-device.md
91+
- name: Use application enforced restrictions
92+
href: howto-policy-app-enforced-restriction.md
9193
- name: Require MFA for Intune enrollment
9294
href: /mem/intune/enrollment/multi-factor-authentication?toc=/azure/active-directory/conditional-access/TOC.json
9395
- name: Block access by location

articles/active-directory/conditional-access/concept-condition-filters-for-devices.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ When creating Conditional Access policies, administrators have asked for the abi
2121

2222
There are multiple scenarios that organizations can now enable using filter for devices condition. Below are some core scenarios with examples of how to use this new condition.
2323

24-
- **Restrict access to privileged resources**. For this example, lets say you want to allow access to Microsoft Azure Management from a user who is assigned a privilged role Global Admin, has satisfied multifactor authentication and accessing from a device that is [privileged or secure admin workstations](/security/compass/privileged-access-devices) and attested as compliant. For this scenario, organizations would create two Conditional Access policies:
24+
- **Restrict access to privileged resources**. For this example, lets say you want to allow access to Microsoft Azure Management from a user who is assigned a privileged role Global Admin, has satisfied multifactor authentication and accessing from a device that is [privileged or secure admin workstations](/security/compass/privileged-access-devices) and attested as compliant. For this scenario, organizations would create two Conditional Access policies:
2525
- Policy 1: All users with the directory role of Global Administrator, accessing the Microsoft Azure Management cloud app, and for Access controls, Grant access, but require multifactor authentication and require device to be marked as compliant.
2626
- Policy 2: All users with the directory role of Global Administrator, accessing the Microsoft Azure Management cloud app, excluding a filter for devices using rule expression device.extensionAttribute1 equals SAW and for Access controls, Block. Learn how to [update extensionAttributes on an Azure AD device object](/graph/api/device-update?view=graph-rest-1.0&tabs=http&preserve-view=true).
2727
- **Block access to organization resources from devices running an unsupported Operating System**. For this example, lets say you want to block access to resources from Windows OS version older than Windows 10. For this scenario, organizations would create the following Conditional Access policy:
@@ -48,7 +48,7 @@ Policy 1: All users with the directory role of Global Administrator, accessing t
4848
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
4949
1. Select **New policy**.
5050
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
51-
1. Under **Assignments**, select **Users or workload identities**..
51+
1. Under **Assignments**, select **Users or workload identities**.
5252
1. Under **Include**, select **Directory roles** and choose **Global Administrator**.
5353

5454
> [!WARNING]
@@ -65,7 +65,7 @@ Policy 2: All users with the directory role of Global Administrator, accessing t
6565

6666
1. Select **New policy**.
6767
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
68-
1. Under **Assignments**, select **Users or workload identities**..
68+
1. Under **Assignments**, select **Users or workload identities**.
6969
1. Under **Include**, select **Directory roles** and choose **Global Administrator**.
7070

7171
> [!WARNING]
@@ -89,7 +89,7 @@ Setting extension attributes is made possible through the Graph API. For more in
8989

9090
### Filter for devices Graph API
9191

92-
The filter for devices API is available in Microsoft Graph v1.0 endpoint and can be accessed using https://graph.microsoft.com/v1.0/identity/conditionalaccess/policies/. You can configure a filter for devices when creating a new Conditional Access policy or you can update an existing policy to configure the filter for devices condition. To update an existing policy, you can do a patch call on the Microsoft Graph v1.0 endpoint mentioned above by appending the policy ID of an existing policy and executing the following request body. The example here shows configuring a filter for devices condition excluding device that are not marked as SAW devices. The rule syntax can consist of more than one single expression. To learn more about the syntax, see [dynamic membership rules for groups in Azure Active Directory](../enterprise-users/groups-dynamic-membership.md).
92+
The filter for devices API is available in Microsoft Graph v1.0 endpoint and can be accessed using https://graph.microsoft.com/v1.0/identity/conditionalaccess/policies/. You can configure a filter for devices when creating a new Conditional Access policy or you can update an existing policy to configure the filter for devices condition. To update an existing policy, you can do a patch call on the Microsoft Graph v1.0 endpoint mentioned above by appending the policy ID of an existing policy and executing the following request body. The example here shows configuring a filter for devices condition excluding devices that aren't marked as SAW devices. The rule syntax can consist of more than one single expression. To learn more about the syntax, see [dynamic membership rules for groups in Azure Active Directory](../enterprise-users/groups-dynamic-membership.md).
9393

9494
```json
9595
{
@@ -130,7 +130,7 @@ The following device attributes can be used with the filter for devices conditio
130130
131131
## Policy behavior with filter for devices
132132

133-
The filter for devices condition in Conditional Access evaluates policy based on device attributes of a registered device in Azure AD and hence it is important to understand under what circumstances the policy is applied or not applied. The table below illustrates the behavior when a filter for devices condition are configured.
133+
The filter for devices condition in Conditional Access evaluates policy based on device attributes of a registered device in Azure AD and hence it's important to understand under what circumstances the policy is applied or not applied. The table below illustrates the behavior when a filter for devices condition is configured.
134134

135135
| Filter for devices condition | Device registration state | Device filter Applied
136136
| --- | --- | --- |

articles/active-directory/conditional-access/howto-conditional-access-policy-compliant-device-admin.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Common Conditional Access policy: Require compliant or hybrid Azure AD joined device for administrators
1919

20-
Accounts that are assigned administrative rights are targeted by attackers. Reqiring those with these rights to perform actions from devices marked as compliant or hybrid Azure AD joined can help limit possible exposure.
20+
Accounts that are assigned administrative rights are targeted by attackers. Requiring users with these highly privileged rights to perform actions from devices marked as compliant or hybrid Azure AD joined can help limit possible exposure.
2121

2222
More information about device compliance policies can be found in the article, [Set rules on devices to allow access to resources in your organization using Intune](/intune/protect/device-compliance-get-started)
2323

articles/active-directory/conditional-access/terms-of-use.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,7 @@ Once you've completed your terms of use policy document, use the following proce
8989
| Expire starting on | Frequency | Result |
9090
| --- | --- | --- |
9191
| Today's date | Monthly | Starting today, users must accept the terms of use policy and then reaccept every month. |
92-
| Date in the future | Monthly | Starting today, users must accept the terms of use policy. When the future date occurs, consents will expire and then users must reaccept every month. |
92+
| Date in the future | Monthly | Starting today, users must accept the terms of use policy. When the future date occurs, consents will expire, and then users must reaccept every month. |
9393

9494
For example, if you set the expire starting on date to **Jan 1** and frequency to **Monthly**, this is how expirations might occur for two users:
9595

@@ -249,10 +249,9 @@ You can edit some details of terms of use policies, but you can't modify an exis
249249
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access** > **Terms of use**.
250250
1. To see who has currently accepted the ToU, select the number under the **Accepted** column for the ToU you want.
251251
1. By default, the next page will show you the current state of each user's acceptance to the ToU
252-
1. If you would like to see the previous consent events, you can select **All** from the **Current State** drop-down. Now you can see each users events in details about each version and what happened.
252+
1. If you would like to see the previous consent events, you can select **All** from the **Current State** drop-down. Now you can see each user's events in details about each version and what happened.
253253
1. Alternatively, you can select a specific version from the **Version** drop-down to see who has accepted that specific version.
254254

255-
256255
## Add a ToU language
257256

258257
The following procedure describes how to add a ToU language.

articles/active-directory/fundamentals/7-secure-access-conditional-access.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ To create a policy that blocks access for external users to a set of application
5555
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
5656
1. Select **New policy**.
5757
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies, for example ExternalAccess_Block_FinanceApps.
58-
1. Under **Assignments**, select **Users or workload identities**..
58+
1. Under **Assignments**, select **Users or workload identities**.
5959
1. Under **Include**, select **All guests and external users**.
6060
1. Under **Exclude**, select **Users and groups** and choose your organization's [emergency access or break-glass accounts](../roles/security-emergency-access.md).
6161
1. Select **Done**.
@@ -75,7 +75,7 @@ There may be times you want to block external users except a specific group. For
7575
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
7676
1. Select **New policy**.
7777
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies, for example ExternalAccess_Block_AllButFinance.
78-
1. Under **Assignments**, select **Users or workload identities**..
78+
1. Under **Assignments**, select **Users or workload identities**.
7979
1. Under **Include**, select **All guests and external users**.
8080
1. Under **Exclude**, select **Users and groups**,
8181
1. Choose your organization's [emergency access or break-glass accounts](../roles/security-emergency-access.md).

articles/active-directory/fundamentals/concept-secure-remote-workers.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ The following table is intended to highlight the key actions for the following l
6868

6969
- Azure Active Directory Premium P1 (Azure AD P1)
7070
- Enterprise Mobility + Security (EMS E3)
71-
- Microsoft 365 (M365 E3, A3, F1, F3)
71+
- Microsoft 365 (E3, A3, F1, F3)
7272

7373
| Recommended action | Detail |
7474
| --- | --- |
@@ -98,7 +98,7 @@ The following table is intended to highlight the key actions for the following l
9898

9999
- Azure Active Directory Premium P2 (Azure AD P2)
100100
- Enterprise Mobility + Security (EMS E5)
101-
- Microsoft 365 (M365 E5, A5)
101+
- Microsoft 365 (E5, A5)
102102

103103
| Recommended action | Detail |
104104
| --- | --- |

0 commit comments

Comments
 (0)