Skip to content

Commit 3fbd91a

Browse files
committed
Added a definition of deprecated accounts
1 parent 0e12e2c commit 3fbd91a

File tree

1 file changed

+7
-5
lines changed

1 file changed

+7
-5
lines changed

articles/security-center/security-center-identity-access.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.devlang: na
1111
ms.topic: conceptual
1212
ms.tgt_pltfrm: na
1313
ms.workload: na
14-
ms.date: 03/06/2020
14+
ms.date: 03/16/2020
1515
ms.author: memildin
1616
---
1717

@@ -24,14 +24,16 @@ When Security Center identifies potential security vulnerabilities, it creates r
2424

2525
The security perimeter has evolved from a network perimeter to an identity perimeter. Security becomes less about defending your network and more about defending your data, as well as managing the security of your apps and users. Nowadays, with more data and more apps moving to the cloud, identity becomes the new perimeter.
2626

27-
By monitoring identity activities, you can take proactive actions before an incident takes place or reactive actions to stop an attack attempt. Examples of recommendations you might see on the **Identity and access** resource security section of Azure Security Center include:
27+
By monitoring identity activities, you can take proactive actions before an incident takes place, or reactive actions to stop an attack attempt. For example, Security Center might flag deprecated accounts (accounts that are no longer needed, and blocked from signing in by Azure Active Directory) for removal.
28+
29+
Examples of recommendations you might see on the **Identity and access** resource security section of Azure Security Center include:
2830

2931
- MFA should be enabled on accounts with owner permissions on your subscription
3032
- A maximum of 3 owners should be designated for your subscription
31-
- Deprecated accounts should be removed from your subscription
3233
- External accounts with read permissions should be removed from your subscription
34+
- Deprecated accounts should be removed from your subscription
3335

34-
For a full list of the recommendations you might see here, see [Identity and Access recommendations](recommendations-reference.md#recs-identity).
36+
For more information about these recommendations as well as a full list of the recommendations you might see here, see [Identity and Access recommendations](recommendations-reference.md#recs-identity).
3537

3638
> [!NOTE]
3739
> If your subscription has more than 600 accounts, Security Center is unable to run the Identity recommendations against your subscription. Recommendations that are not run are listed under "unavailable assessments" below.
@@ -51,7 +53,7 @@ All of the identity and access recommendations are available within two security
5153

5254
Enabling MFA requires [Azure Active Directory (AD) tenant permissions](https://docs.microsoft.com/azure/active-directory/users-groups-roles/directory-assign-admin-roles).
5355

54-
- If you have a premium edition of AD, enable MFA using using [conditional access](https://docs.microsoft.com/azure/active-directory/conditional-access/overview).
56+
- If you have a premium edition of AD, enable MFA using [conditional access](https://docs.microsoft.com/azure/active-directory/conditional-access/overview).
5557

5658
- Users of AD free edition can enable **security defaults** in Azure Active Directory as described in the [AD documentation](https://docs.microsoft.com/azure/active-directory/fundamentals/concept-fundamentals-security-defaults) but the Security Center recommendation to enable MFA will still appear.
5759

0 commit comments

Comments
 (0)