Skip to content

Commit 3b880fa

Browse files
authored
Merge pull request #190191 from MicrosoftGuyJFlo/SecurityDefaultsUpdate
[Azure AD] Conditional Access - Security defaults update
2 parents c60bda9 + 43508e3 commit 3b880fa

File tree

1 file changed

+18
-10
lines changed

1 file changed

+18
-10
lines changed

articles/active-directory/fundamentals/concept-fundamentals-security-defaults.md

Lines changed: 18 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 02/11/2022
9+
ms.date: 03/01/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -39,12 +39,12 @@ Microsoft is making security defaults available to everyone. The goal is to ensu
3939

4040
### Who's it for?
4141

42-
- If you're an organization that wants to increase your security posture but you don't know how or where to start, security defaults are for you.
43-
- If you're an organization using the free tier of Azure Active Directory licensing, security defaults are for you.
42+
- Organizations who want to increase their security posture, but don't know how or where to start.
43+
- Organizations using the free tier of Azure Active Directory licensing.
4444

4545
### Who should use Conditional Access?
4646

47-
- If you're an organization currently using Conditional Access policies to bring signals together, to make decisions, and enforce organizational policies, security defaults are probably not right for you.
47+
- If you're an organization currently using Conditional Access policies, security defaults are probably not right for you.
4848
- If you're an organization with Azure Active Directory Premium licenses, security defaults are probably not right for you.
4949
- If your organization has complex security requirements, you should consider Conditional Access.
5050

@@ -110,7 +110,13 @@ Using Azure Resource Manager to manage your services is a highly privileged acti
110110

111111
It's important to verify the identity of users who want to access Azure Resource Manager and update configurations. You verify their identity by requiring more authentication before you allow access.
112112

113-
After you enable security defaults in your tenant, any user who's accessing the Azure portal, Azure PowerShell, or the Azure CLI will need to complete more authentication. This policy applies to all users who are accessing Azure Resource Manager, whether they're an administrator or a user.
113+
After you enable security defaults in your tenant, any user accessing the following services must complete multi-factor authentication:
114+
115+
- Azure portal
116+
- Azure PowerShell
117+
- Azure CLI
118+
119+
This policy applies to all users who are accessing Azure Resource Manager services, whether they're an administrator or a user.
114120

115121
> [!NOTE]
116122
> Pre-2017 Exchange Online tenants have modern authentication disabled by default. In order to avoid the possibility of a login loop while authenticating through these tenants, you must [enable modern authentication](/exchange/clients-and-mobile-in-exchange-online/enable-or-disable-modern-authentication-in-exchange-online).
@@ -134,9 +140,7 @@ Emergency access accounts are:
134140
- Aren't used on a daily basis
135141
- Are protected with a long complex password
136142

137-
The credentials for these emergency access accounts should be stored offline in a secure location such as a fireproof safe. Only authorized individuals should have access to these credentials.
138-
139-
For more detailed information about emergency access accounts, see the article [Manage emergency access accounts in Azure AD](../roles/security-emergency-access.md).
143+
The credentials for these emergency access accounts should be stored offline in a secure location such as a fireproof safe. Only authorized individuals should have access to these credentials.
140144

141145
To create an emergency access account:
142146

@@ -151,6 +155,10 @@ To create an emergency access account:
151155
1. Under **Usage location**, select the appropriate location.
152156
1. Select **Create**.
153157

158+
You may choose [disable password expiration](../authentication/concept-sspr-policy.md#set-a-password-to-never-expire) to for these accounts using Azure AD PowerShell.
159+
160+
For more detailed information about emergency access accounts, see the article [Manage emergency access accounts in Azure AD](../roles/security-emergency-access.md).
161+
154162
### Authentication methods
155163

156164
These free security defaults allow registration and use of Azure AD Multi-Factor Authentication **using only the Microsoft Authenticator app using notifications**. Conditional Access allows the use of any authentication method the administrator chooses to enable.
@@ -175,11 +183,11 @@ If your organization is a previous user of per-user based Azure AD Multi-Factor
175183

176184
### Conditional Access
177185

178-
You can use Conditional Access to configure policies similar to security defaults, but with more granularity including user exclusions, which aren't available in security defaults. If you're using Conditional Access and have Conditional Access policies enabled in your environment, security defaults won't be available to you. If you have a license that provides Conditional Access but don't have any Conditional Access policies enabled in your environment, you're welcome to use security defaults until you enable Conditional Access policies. More information about Azure AD licensing can be found on the [Azure AD pricing page](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing).
186+
You can use Conditional Access to configure policies similar to security defaults, but with more granularity including user exclusions, which aren't available in security defaults. If you're using Conditional Access and have Conditional Access policies enabled in your environment, security defaults won't be available to you. More information about Azure AD licensing can be found on the [Azure AD pricing page](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing).
179187

180188
![Warning message that you can have security defaults or Conditional Access not both](./media/concept-fundamentals-security-defaults/security-defaults-conditional-access.png)
181189

182-
Here are step-by-step guides on how you can use Conditional Access to configure a set of policies, which form a good starting point for protecting your identities:
190+
Here are step-by-step guides for Conditional Access to configure a set of policies, which form a good starting point for protecting your identities:
183191

184192
- [Require MFA for administrators](../conditional-access/howto-conditional-access-policy-admin-mfa.md)
185193
- [Require MFA for Azure management](../conditional-access/howto-conditional-access-policy-azure-management.md)

0 commit comments

Comments
 (0)