Skip to content

Commit 444358d

Browse files
authored
Merge pull request #178561 from Justinha/mau-2
Update how-to-authentication-find-coverage-gaps.md
2 parents add7409 + 3dfd42a commit 444358d

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/active-directory/authentication/how-to-authentication-find-coverage-gaps.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,15 +47,15 @@ Based on gaps you found, require administrators to use multi-factor authenticati
4747

4848
- Run the [MFA enablement wizard](https://aka.ms/MFASetupGuide) to choose your MFA policy.
4949

50-
- If you assign custom or built-in admin roles in [Privileged Identity Management](/privileged-identity-management/pim-configure), require multi-factor authentication upon role activation.
50+
- If you assign custom or built-in admin roles in [Privileged Identity Management](https://docs.microsoft.com/azure/active-directory/privileged-identity-management/pim-configure), require multi-factor authentication upon role activation.
5151

5252
## Use Passwordless and phishing resistant authentication methods for your administrators
5353

5454
After your admins are enforced for multi-factor authentication and have been using it for a while, it is time to raise the bar on strong authentication and use Passwordless and phishing resistant authentication method:
5555

5656
- [Phone Sign-in (with Microsoft Authenticator)](concept-authentication-authenticator-app.md)
5757
- [FIDO2](concept-authentication-passwordless.md#fido2-security-keys)
58-
- [Windows Hello for Business](/windows/security/identity-protection/hello-for-business/hello-overview)
58+
- [Windows Hello for Business](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-overview)
5959

6060
You can read more about these authentication methods and their security considerations in [Azure AD authentication methods](concept-authentication-methods.md).
6161

0 commit comments

Comments
 (0)