Skip to content

Commit 22f13fb

Browse files
authored
Merge pull request #229805 from shlipsey3/recommendations-app-health-images-030723
recommendation-images
2 parents f99a5f7 + 18d8ee5 commit 22f13fb

File tree

13 files changed

+33
-27
lines changed

13 files changed

+33
-27
lines changed
Loading
76.3 KB
Loading
Loading
Loading
Loading
Loading

articles/active-directory/reports-monitoring/recommendation-mfa-from-known-devices.md

Lines changed: 12 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.topic: reference
99
ms.workload: identity
1010
ms.subservice: report-monitor
11-
ms.date: 03/02/2023
11+
ms.date: 03/07/2023
1212
ms.author: sarahlipsey
1313
ms.reviewer: hafowler
1414

@@ -19,37 +19,35 @@ ms.collection: M365-identity-device-management
1919

2020
[Azure AD recommendations](overview-recommendations.md) is a feature that provides you with personalized insights and actionable guidance to align your tenant with recommended best practices.
2121

22-
2322
This article covers the recommendation to minimize multi-factor authentication (MFA) prompts from known devices. This recommendation is called `tenantMFA` in the recommendations API in Microsoft Graph.
2423

2524
## Description
2625

2726
As an admin, you want to maintain security for your company’s resources, but you also want your employees to easily access resources as needed.
2827

29-
MFA enables you to enhance the security posture of your tenant. While enabling MFA is a good practice, you should try to keep the number of MFA prompts your users have to go through at a minimum. One option you have to accomplish this goal is to **allow users to remember multi-factor authentication on devices they trust**.
30-
31-
The remember multi-factor authentication feature sets a persistent cookie on the browser when a user selects the Don't ask again for X days option at sign-in. The user isn't prompted again for MFA from that browser until the cookie expires. If the user opens a different browser on the same device or clears the cookies, they're prompted again to verify.
28+
MFA enables you to enhance the security posture of your tenant. While enabling MFA is a good practice, you should try to keep the number of MFA prompts your users have to go through at a minimum. One option you have to accomplish this goal is to **allow users to remember multi-factor authentication on trusted devices**.
3229

33-
![Remember MFA on trusted devices](./media/recommendation-mfa-from-known-devices\remember-mfa-on-trusted-devices.png)
30+
The "remember multi-factor authentication on trusted device" feature sets a persistent cookie on the browser when a user selects the "Don't ask again for X days" option at sign-in. The user isn't prompted again for MFA from that browser until the cookie expires. If the user opens a different browser on the same device or clears the cookies, they're prompted again to verify.
3431

3532
For more information, see [Configure Azure AD Multi-Factor Authentication settings](../authentication/howto-mfa-mfasettings.md).
3633

37-
38-
## Logic
39-
40-
This recommendation shows up, if you have set the remember multi-factor authentication feature to less than 30 days.
41-
34+
This recommendation shows up if you have set the **remember multi-factor authentication** feature to less than 30 days.
4235

4336
## Value
4437

4538
This recommendation improves your user's productivity and minimizes the sign-in time with fewer MFA prompts. Ensure that your most sensitive resources can have the tightest controls, while your least sensitive resources can be more freely accessible.
4639

4740
## Action plan
4841

49-
1. Review [configure Azure AD Multi-Factor Authentication settings](../authentication/howto-mfa-mfasettings.md).
42+
1. Review the [How to configure Azure AD Multi-Factor Authentication settings](../authentication/howto-mfa-mfasettings.md) article.
43+
1. Go to **Azure AD** > **Multifactor authentication** > select the **Additional cloud-based multifactor authentication settings** link.
44+
45+
![Screenshot of the configuration settings link in Azure AD multifactor authentication section.](media/recommendation-mfa-from-known-devices/mfa-configuration-settings.png)
46+
47+
1. Adjust the number of days in the **remember multi-factor authentication on trusted device** section to 90 days.
48+
49+
![Remember MFA on trusted devices](./media/recommendation-mfa-from-known-devices\remember-mfa-on-trusted-devices.png)
5050

51-
2. Set the remember multi-factor authentication feature to 90 days.
52-
5351

5452
## Next steps
5553

articles/active-directory/reports-monitoring/recommendation-migrate-apps-from-adfs-to-azure-ad.md

Lines changed: 2 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.topic: reference
99
ms.workload: identity
1010
ms.subservice: report-monitor
11-
ms.date: 03/02/2023
11+
ms.date: 03/07/2023
1212
ms.author: sarahlipsey
1313
ms.reviewer: hafowler
1414

@@ -23,11 +23,7 @@ This article covers the recommendation to migrate apps from Active Directory Fed
2323

2424
## Description
2525

26-
As an admin responsible for managing applications, I want my applications to use Azure AD’s security features and maximize their value.
27-
28-
## Logic
29-
30-
If a tenant has apps on AD FS, and any of these apps are deemed 100% migratable, this recommendation shows up.
26+
As an admin responsible for managing applications, you want your applications to use Azure AD’s security features and maximize their value. This recommendation shows up if your tenant has apps on ADFS that can 100% be migrated to Azure AD.
3127

3228
## Value
3329

articles/active-directory/reports-monitoring/recommendation-migrate-to-authenticator.md

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.topic: reference
99
ms.workload: identity
1010
ms.subservice: report-monitor
11-
ms.date: 03/02/2023
11+
ms.date: 03/07/2023
1212
ms.author: sarahlipsey
1313
ms.reviewer: hafowler
1414

@@ -21,17 +21,14 @@ ms.collection: M365-identity-device-management
2121

2222
This article covers the recommendation to migrate users to the Microsoft Authenticator app, which is currently a preview recommendation. This recommendation is called `useAuthenticatorApp` in the recommendations API in Microsoft Graph.
2323

24-
2524
## Description
2625

27-
Multi-factor authentication (MFA) is a key component to improve the security posture of your Azure AD tenant. However, while keeping your tenant safe is important, you should also keep an eye on keeping the security related overhead as little as possible on your users.
26+
Multi-factor authentication (MFA) is a key component to improve the security posture of your Azure AD tenant. While SMS text and voice calls were once commonly used for multi-factor authentication, they are becoming increasingly less secure. You also don't want to overwhelm your users with lots of MFA methods and messages.
2827

29-
One possibility to accomplish this goal is to migrate users using SMS or voice call for MFA to use the Microsoft authenticator app.
28+
One way to ease the burden on your users while also increasing the security of their authentication methods is to migrate anyone using SMS or voice call for MFA to use the Microsoft Authenticator app.
3029

3130
This recommendation appears if Azure AD detects that your tenant has users authenticating using SMS or voice instead of the Microsoft Authenticator app in the past week.
3231

33-
![Screenshot of the Migrate from SMS to Microsoft Authenticator app recommendation.](media/recommendation-migrate-to-authenticator/recommendation-migrate-sms-to-authenticator.png)
34-
3532
## Value
3633

3734
Push notifications through the Microsoft Authenticator app provide the least intrusive MFA experience for users. This method is the most reliable and secure option because it relies on a data connection rather than telephony.

0 commit comments

Comments
 (0)