Skip to content

Commit 37fa714

Browse files
authored
Merge pull request #107161 from MicrosoftGuyJFlo/patch-2
Update howto-password-ban-bad-on-premises-operations.md
2 parents 3f43b99 + d82895a commit 37fa714

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/active-directory/authentication/howto-password-ban-bad-on-premises-operations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.reviewer: jsimmons
1515

1616
ms.collection: M365-identity-device-management
1717
---
18-
# Enable on-premises Azure Active Password Protection
18+
# Enable on-premises Azure Active Directory Password Protection
1919

2020
Users often create passwords that use common local words such as a school, sports team, or famous person. These passwords are easy to guess, and weak against dictionary-based attacks. To enforce strong passwords in your organization, Azure Active Directory (Azure AD) Password Protection provides a global and custom banned password list. A password change request fails if there's a match in these banned password list.
2121

0 commit comments

Comments
 (0)