You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-desktop/overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -98,7 +98,7 @@ The Azure virtual machines you create for Windows Virtual Desktop must have acce
98
98
>[!IMPORTANT]
99
99
>We recommend you use the service tags instead of URLs in most cases to prevent service issues. Unblocking these URLs is essential for a reliable Windows Virtual Desktop deployment. Blocking access to these URLs is unsupported and will affect service functionality. These URLs only correspond to Windows Virtual Desktop sites and resources, and don't include URLs for other services like Azure Active Directory.
100
100
>
101
-
>Windows Virtual Desktop now supports the FQDN tag.
101
+
>Windows Virtual Desktop now supports the FQDN tag. For more information, see [Use Azure Firewall to protect Window Virtual Desktop deployments](../firewall/protect-windows-virtual-desktop.md).
102
102
103
103
The following table lists optional URLs that your Azure virtual machines can have access to:
Copy file name to clipboardExpand all lines: articles/virtual-desktop/set-up-mfa.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,21 +34,21 @@ Here's what you'll need to get started:
34
34
This section will show you how to create a Conditional Access policy that requires multi-factor authentication when connecting to Windows Virtual Desktop.
35
35
36
36
1. Sign in to the **Azure portal** as a global administrator, security administrator, or Conditional Access administrator.
37
-
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
38
-
1. Select **New policy**.
39
-
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
40
-
1. Under **Assignments**, select **Users and groups**.
37
+
2. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
38
+
3. Select **New policy**.
39
+
4. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
40
+
5. Under **Assignments**, select **Users and groups**.
41
41
- Under **Include**, select **Select users and groups** > **Users and groups** > Choose the group created in the prerequisites stage.
42
42
- Select **Done**.
43
-
1. Under **Cloud apps or actions** > **Include**, select **Select apps**.
43
+
6. Under **Cloud apps or actions** > **Include**, select **Select apps**.
44
44
- Choose **Windows Virtual Desktop**, then **Select**, and then then **Done**.
45
45
46
46

47
47
48
-
2. Under **Access controls** > **Grant**, select **Grant access**, **Require multi-factor authentication**, and then **Select**.
49
-
3. Under **Access controls** > **Session**, select **Sign-in frequency**, set the value to **1** and the unit to **Hours**, and then select **Select**.
50
-
4. Confirm your settings and set **Enable policy** to **On**.
51
-
5. Select **Create** to enable your policy.
48
+
7. Under **Access controls** > **Grant**, select **Grant access**, **Require multi-factor authentication**, and then **Select**.
49
+
8. Under **Access controls** > **Session**, select **Sign-in frequency**, set the value to **1** and the unit to **Hours**, and then select **Select**.
50
+
9. Confirm your settings and set **Enable policy** to **On**.
0 commit comments