Skip to content

Commit 3991c6c

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents e0736eb + 5965328 commit 3991c6c

File tree

150 files changed

+8297
-968
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

150 files changed

+8297
-968
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1045,7 +1045,6 @@
10451045
".openpublishing.redirection.baremetal-infrastructure.json",
10461046
".openpublishing.redirection.defender-for-cloud.json",
10471047
".openpublishing.redirection.defender-for-iot.json",
1048-
".openpublishing.redirection.healthcare-apis.json",
10491048
".openpublishing.redirection.iot-hub-device-update.json",
10501049
".openpublishing.redirection.json",
10511050
".openpublishing.redirection.key-vault.json",
@@ -1076,6 +1075,7 @@
10761075
"articles/event-grid/.openpublishing.redirection.event-grid.json",
10771076
"articles/event-hubs/.openpublishing.redirection.event-hubs.json",
10781077
"articles/hdinsight/.openpublishing.redirection.hdinsight.json",
1078+
"articles/healthcare-apis/.openpublishing.redirection.healthcare-apis.json",
10791079
"articles/iot-accelerators/.openpublishing.redirection.iot-accelerators.json",
10801080
"articles/iot-central/.openpublishing.redirection.iot-central.json",
10811081
"articles/iot-develop/.openpublishing.redirection.iot-develop.json",

.openpublishing.redirection.json

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -23638,11 +23638,6 @@
2363823638
"redirect_url": "/azure/azure-monitor/app/java-get-started-supplemental",
2363923639
"redirect_document_id": true
2364023640
},
23641-
{
23642-
"source_path_from_root": "/articles/healthcare-apis/dicom/dicom-cast-access-request.md",
23643-
"redirect_url": "/azure/healthcare-apis/dicom/dicom-cast-overview",
23644-
"redirect_document_id": false
23645-
},
2364623641
{
2364723642
"source_path_from_root": "/articles/virtual-network/nat-gateway/faq.yml",
2364823643
"redirect_url": "/azure/nat-gateway/faq",

articles/active-directory-b2c/conditional-access-user-flow.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -208,7 +208,7 @@ The following template can be used to create a Conditional Access policy with di
208208

209209
Identity Protection can calculate what it believes is normal for a user's behavior and use that to base decisions for their risk. User risk is a calculation of probability that an identity has been compromised. B2C tenants with P2 licenses can create Conditional Access policies incorporating user risk. When a user is detected as at risk, you can require that they securely change their password to remediate the risk and gain access to their account. We highly recommend setting up a user risk policy to require a secure password change so users can self-remediate.
210210

211-
Learn more about [user risk in Identity Protection](../active-directory/identity-protection/concept-identity-protection-risks.md#user-linked-detections), taking into account the [limitations on Identity Protection detections for B2C](identity-protection-investigate-risk.md#service-limitations-and-considerations).
211+
Learn more about [user risk in Identity Protection](../active-directory/identity-protection/concept-identity-protection-risks.md), taking into account the [limitations on Identity Protection detections for B2C](identity-protection-investigate-risk.md#service-limitations-and-considerations).
212212

213213
Configure Conditional Access through Azure portal or Microsoft Graph APIs to enable a user risk-based Conditional Access policy requiring multifactor authentication (MFA) and password change when user risk is medium OR high.
214214

articles/active-directory/authentication/howto-mfa-mfasettings.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Configure Azure AD Multi-Factor Authentication
3-
description: Learn how to configure settings for Azure AD Multi-Factor Authentication in the Azure portal
3+
description: Learn how to configure settings for Azure AD Multi-Factor Authentication
44

55
services: multi-factor-authentication
66
ms.service: active-directory
@@ -18,9 +18,9 @@ ms.custom: contperf-fy20q4
1818
---
1919
# Configure Azure AD Multi-Factor Authentication settings
2020

21-
To customize the end-user experience for Azure AD Multi-Factor Authentication, you can configure options for settings like account lockout thresholds or fraud alerts and notifications. Some settings are available directly in the Azure portal for Azure Active Directory (Azure AD), and some are in a separate Azure AD Multi-Factor Authentication portal.
21+
To customize the end-user experience for Azure AD Multi-Factor Authentication, you can configure options for settings like account lockout thresholds or fraud alerts and notifications.
2222

23-
The following Azure AD Multi-Factor Authentication settings are available in the Azure portal:
23+
The following Azure AD Multi-Factor Authentication settings are available:
2424

2525
| Feature | Description |
2626
| ------- | ----------- |

articles/active-directory/authentication/howto-mfa-userdevicesettings.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 06/01/2023
9+
ms.date: 07/05/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -90,8 +90,9 @@ If you're assigned the *Authentication Administrator* role, you can require user
9090
1. On the left, select **Azure Active Directory** > **Users** > **All users**.
9191
1. Choose the user you wish to perform an action on and select **Authentication methods**. At the top of the window, then choose one of the following options for the user:
9292
- **Reset Password** resets the user's password and assigns a temporary password that must be changed on the next sign-in.
93-
- **Require Re-register MFA** deactivates the user's hardware OATH tokens and deletes the following authentication methods from this user: phone numbers, Microsoft Authenticator apps and software OATH tokens. If needed, the user is requested to set up a new MFA authentication method the next time they sign in.
94-
93+
- **Require Re-register MFA** makes it so that when the user signs in next time, they're requested to set up a new MFA authentication method.
94+
> [!NOTE]
95+
> The user's currently registered authentication methods aren't deleted when an admin requires re-registration for MFA. After a user re-registers for MFA, we recommend they review their security info and delete any previously registered authentication methods that are no longer usable.
9596
- **Revoke MFA Sessions** clears the user's remembered MFA sessions and requires them to perform MFA the next time it's required by the policy on the device.
9697

9798
:::image type="content" source="media/howto-mfa-userdevicesettings/manage-authentication-methods-in-azure.png" alt-text="Manage authentication methods from the Azure portal":::

articles/active-directory/conditional-access/concept-conditional-access-conditions.md

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 01/24/2023
9+
ms.date: 06/14/2023
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -28,11 +28,11 @@ For example, when accessing a sensitive application an administrator may factor
2828

2929
## Sign-in risk
3030

31-
For customers with access to [Identity Protection](../identity-protection/overview-identity-protection.md), sign-in risk can be evaluated as part of a Conditional Access policy. Sign-in risk represents the probability that a given authentication request isn't authorized by the identity owner. More information about sign-in risk can be found in the articles, [What is risk](../identity-protection/concept-identity-protection-risks.md#sign-in-risk) and [How To: Configure and enable risk policies](../identity-protection/howto-identity-protection-configure-risk-policies.md).
31+
For customers with access to [Identity Protection](../identity-protection/overview-identity-protection.md), sign-in risk can be evaluated as part of a Conditional Access policy. Sign-in risk represents the probability that a given authentication request isn't authorized by the identity owner. More information about sign-in risk can be found in the articles, [What is risk](../identity-protection/concept-identity-protection-risks.md) and [How To: Configure and enable risk policies](../identity-protection/howto-identity-protection-configure-risk-policies.md).
3232

3333
## User risk
3434

35-
For customers with access to [Identity Protection](../identity-protection/overview-identity-protection.md), user risk can be evaluated as part of a Conditional Access policy. User risk represents the probability that a given identity or account is compromised. More information about user risk can be found in the articles, [What is risk](../identity-protection/concept-identity-protection-risks.md#user-linked-detections) and [How To: Configure and enable risk policies](../identity-protection/howto-identity-protection-configure-risk-policies.md).
35+
For customers with access to [Identity Protection](../identity-protection/overview-identity-protection.md), user risk can be evaluated as part of a Conditional Access policy. User risk represents the probability that a given identity or account is compromised. More information about user risk can be found in the articles, [What is risk](../identity-protection/concept-identity-protection-risks.md) and [How To: Configure and enable risk policies](../identity-protection/howto-identity-protection-configure-risk-policies.md).
3636

3737
## Device platforms
3838

@@ -213,7 +213,4 @@ There’s a new optional condition in Conditional Access called filter for devic
213213
## Next steps
214214

215215
- [Conditional Access: Grant](concept-conditional-access-grant.md)
216-
217-
- [Conditional Access common policies](concept-conditional-access-policy-common.md)
218-
219-
216+
- [Common Conditional Access policies](concept-conditional-access-policy-common.md)

articles/active-directory/conditional-access/howto-conditional-access-policy-risk.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.collection: M365-identity-device-management
1919

2020
Most users have a normal behavior that can be tracked, when they fall outside of this norm it could be risky to allow them to just sign in. You may want to block that user or maybe just ask them to perform multifactor authentication to prove that they're really who they say they are.
2121

22-
A sign-in risk represents the probability that a given authentication request isn't authorized by the identity owner. Organizations with Azure AD Premium P2 licenses can create Conditional Access policies incorporating [Azure AD Identity Protection sign-in risk detections](../identity-protection/concept-identity-protection-risks.md#sign-in-risk).
22+
A sign-in risk represents the probability that a given authentication request isn't authorized by the identity owner. Organizations with Azure AD Premium P2 licenses can create Conditional Access policies incorporating [Azure AD Identity Protection sign-in risk detections](../identity-protection/concept-identity-protection-risks.md).
2323

2424
There are two locations where this policy may be configured, Conditional Access and Identity Protection. Configuration using a Conditional Access policy is the preferred method providing more context including enhanced diagnostic data, report-only mode integration, Graph API support, and the ability to utilize other Conditional Access attributes like sign-in frequency in the policy.
2525

0 commit comments

Comments
 (0)