Skip to content

Commit 330bff2

Browse files
Merge pull request #211015 from MicrosoftGuyJFlo/SDFixes
[Azure AD] Conditional Access - Security defaults updates
2 parents 18cf37a + 6116446 commit 330bff2

File tree

1 file changed

+17
-17
lines changed

1 file changed

+17
-17
lines changed

articles/active-directory/fundamentals/concept-fundamentals-security-defaults.md

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: Azure Active Directory security defaults
3-
description: Security default policies that help protect organizations from common attacks in Azure AD
2+
title: Providing a default level of security in Azure Active Directory
3+
description: Azure AD Security defaults that help protect organizations from common identity attacks
44

55
services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 09/12/2022
9+
ms.date: 09/13/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -19,13 +19,13 @@ ms.custom: contperf-fy20q4
1919
---
2020
# Security defaults in Azure AD
2121

22-
Microsoft is making security defaults available to everyone, because managing security can be difficult. Identity-related attacks like password spray, replay, and phishing are common in today's environment. More than 99.9% of these identity-related attacks are stopped by using multi-factor authentication (MFA) and blocking legacy authentication. The goal is to ensure that all organizations have at least a basic level of security enabled at no extra cost.
22+
Microsoft is making security defaults available to everyone, because managing security can be difficult. Identity-related attacks like password spray, replay, and phishing are common in today's environment. More than 99.9% of these identity-related attacks are stopped by using multifactor authentication (MFA) and blocking legacy authentication. The goal is to ensure that all organizations have at least a basic level of security enabled at no extra cost.
2323

2424
Security defaults make it easier to help protect your organization from these identity-related attacks with preconfigured security settings:
2525

2626
- [Requiring all users to register for Azure AD Multi-Factor Authentication](#require-all-users-to-register-for-azure-ad-multi-factor-authentication).
27-
- [Requiring administrators to do multi-factor authentication](#require-administrators-to-do-multi-factor-authentication).
28-
- [Requiring users to do multi-factor authentication when necessary](#require-users-to-do-multi-factor-authentication-when-necessary).
27+
- [Requiring administrators to do multifactor authentication](#require-administrators-to-do-multifactor-authentication).
28+
- [Requiring users to do multifactor authentication when necessary](#require-users-to-do-multifactor-authentication-when-necessary).
2929
- [Blocking legacy authentication protocols](#block-legacy-authentication-protocols).
3030
- [Protecting privileged activities like access to the Azure portal](#protect-privileged-activities-like-access-to-the-azure-portal).
3131

@@ -58,11 +58,11 @@ To enable security defaults in your directory:
5858

5959
### Require all users to register for Azure AD Multi-Factor Authentication
6060

61-
All users in your tenant must register for multi-factor authentication (MFA) in the form of the Azure AD Multi-Factor Authentication. Users have 14 days to register for Azure AD Multi-Factor Authentication by using the Microsoft Authenticator app. After the 14 days have passed, the user can't sign in until registration is completed. A user's 14-day period begins after their first successful interactive sign-in after enabling security defaults.
61+
All users in your tenant must register for multifactor authentication (MFA) in the form of the Azure AD Multi-Factor Authentication. Users have 14 days to register for Azure AD Multi-Factor Authentication by using the Microsoft Authenticator app. After the 14 days have passed, the user can't sign in until registration is completed. A user's 14-day period begins after their first successful interactive sign-in after enabling security defaults.
6262

63-
### Require administrators to do multi-factor authentication
63+
### Require administrators to do multifactor authentication
6464

65-
Administrators have increased access to your environment. Because of the power these highly privileged accounts have, you should treat them with special care. One common method to improve the protection of privileged accounts is to require a stronger form of account verification for sign-in. In Azure AD, you can get a stronger account verification by requiring multi-factor authentication.
65+
Administrators have increased access to your environment. Because of the power these highly privileged accounts have, you should treat them with special care. One common method to improve the protection of privileged accounts is to require a stronger form of account verification for sign-in. In Azure AD, you can get a stronger account verification by requiring multifactor authentication.
6666

6767
> [!TIP]
6868
> We recommend having separate accounts for administration and standard productivity tasks to significantly reduce the number of times your admins are prompted for MFA.
@@ -83,16 +83,16 @@ After registration with Azure AD Multi-Factor Authentication is finished, the fo
8383
- SharePoint administrator
8484
- User administrator
8585

86-
### Require users to do multi-factor authentication when necessary
86+
### Require users to do multifactor authentication when necessary
8787

8888
We tend to think that administrator accounts are the only accounts that need extra layers of authentication. Administrators have broad access to sensitive information and can make changes to subscription-wide settings. But attackers frequently target end users.
8989

9090
After these attackers gain access, they can request access to privileged information for the original account holder. They can even download the entire directory to do a phishing attack on your whole organization.
9191

92-
One common method to improve protection for all users is to require a stronger form of account verification, such as Multi-Factor Authentication, for everyone. After users complete Multi-Factor Authentication registration, they'll be prompted for another authentication whenever necessary. Azure AD decides when a user will be prompted for Multi-Factor Authentication, based on factors such as location, device, role and task. This functionality protects all applications registered with Azure AD including SaaS applications.
92+
One common method to improve protection for all users is to require a stronger form of account verification, such as multifactor authentication, for everyone. After users complete registration, they'll be prompted for another authentication whenever necessary. Azure AD decides when a user will be prompted for multifactor authentication, based on factors such as location, device, role and task. This functionality protects all applications registered with Azure AD including SaaS applications.
9393

9494
> [!NOTE]
95-
> In case of [B2B direct connect](https://docs.microsoft.com/azure/active-directory/external-identities/b2b-direct-connect-overview) users, any Multi-Factor Authentication requirment due to security defaults enabled by resource tenant will need to be satisfied, including Multi-Factor Authentication registration by the direct connect user in their home tenant.
95+
> In case of [B2B direct connect](../external-identities/b2b-direct-connect-overview.md) users, any multifactor authentication requirement from security defaults enabled in resource tenant will need to be satisfied, including multifactor authentication registration by the direct connect user in their home tenant.
9696
9797
### Block legacy authentication protocols
9898

@@ -101,7 +101,7 @@ To give your users easy access to your cloud apps, Azure AD supports various aut
101101
- Clients that don't use modern authentication (for example, an Office 2010 client).
102102
- Any client that uses older mail protocols such as IMAP, SMTP, or POP3.
103103

104-
Today, most compromising sign-in attempts come from legacy authentication. Legacy authentication doesn't support Multi-Factor Authentication. Even if you have a Multi-Factor Authentication policy enabled on your directory, an attacker can authenticate by using an older protocol and bypass Multi-Factor Authentication.
104+
Today, most compromising sign-in attempts come from legacy authentication. Legacy authentication doesn't support multifactor authentication. Even if you have a multifactor authentication policy enabled on your directory, an attacker can authenticate by using an older protocol and bypass multifactor authentication.
105105

106106
After security defaults are enabled in your tenant, all authentication requests made by an older protocol will be blocked. Security defaults blocks Exchange Active Sync basic authentication.
107107

@@ -122,7 +122,7 @@ Using Azure Resource Manager to manage your services is a highly privileged acti
122122

123123
It's important to verify the identity of users who want to access Azure Resource Manager and update configurations. You verify their identity by requiring more authentication before you allow access.
124124

125-
After you enable security defaults in your tenant, any user accessing the following services must complete multi-factor authentication:
125+
After you enable security defaults in your tenant, any user accessing the following services must complete multifactor authentication:
126126

127127
- Azure portal
128128
- Azure PowerShell
@@ -134,7 +134,7 @@ This policy applies to all users who are accessing Azure Resource Manager servic
134134
> Pre-2017 Exchange Online tenants have modern authentication disabled by default. In order to avoid the possibility of a login loop while authenticating through these tenants, you must [enable modern authentication](/exchange/clients-and-mobile-in-exchange-online/enable-or-disable-modern-authentication-in-exchange-online).
135135
136136
> [!NOTE]
137-
> The Azure AD Connect synchronization account is excluded from security defaults and will not be prompted to register for or perform multi-factor authentication. Organizations should not be using this account for other purposes.
137+
> The Azure AD Connect synchronization account is excluded from security defaults and will not be prompted to register for or perform multifactor authentication. Organizations should not be using this account for other purposes.
138138
139139
## Deployment considerations
140140

@@ -180,15 +180,15 @@ For more detailed information about emergency access accounts, see the article [
180180

181181
### B2B users
182182

183-
Any [B2B guest](https://docs.microsoft.com/azure/active-directory/external-identities/what-is-b2b) users or [B2B direct connect](https://docs.microsoft.com/azure/active-directory/external-identities/b2b-direct-connect-overview) users that access your directory will be subject to the same controls as your organization's users.
183+
Any [B2B guest](../external-identities/what-is-b2b.md) users or [B2B direct connect](../external-identities/b2b-direct-connect-overview.md) users that access your directory are treated the same as your organization's users.
184184

185185
### Disabled MFA status
186186

187187
If your organization is a previous user of per-user based Azure AD Multi-Factor Authentication, don't be alarmed to not see users in an **Enabled** or **Enforced** status if you look at the Multi-Factor Auth status page. **Disabled** is the appropriate status for users who are using security defaults or Conditional Access based Azure AD Multi-Factor Authentication.
188188

189189
### Conditional Access
190190

191-
You can use Conditional Access to configure policies similar to security defaults, but with more granularity including selecting other authentication methods and the ability to exclude users, which aren't available in security defaults. If you're using Conditional Access in your environment today, security defaults won't be available to you.
191+
You can use Conditional Access to configure policies similar to security defaults, but with more granularity. Conditional Access policies allow selecting other authentication methods and the ability to exclude users, which aren't available in security defaults. If you're using Conditional Access in your environment today, security defaults won't be available to you.
192192

193193
![Warning message that you can have security defaults or Conditional Access not both](./media/concept-fundamentals-security-defaults/security-defaults-conditional-access.png)
194194

0 commit comments

Comments
 (0)