Skip to content

Commit 4780bed

Browse files
committed
revised portal steps
1 parent b603889 commit 4780bed

7 files changed

+41
-44
lines changed

articles/active-directory/authentication/howto-password-ban-bad-on-premises-deploy.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 06/01/2023
9+
ms.date: 09/14/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -96,7 +96,7 @@ The following core requirements apply:
9696

9797
> [!NOTE]
9898
> Some endpoints, such as the CRL endpoint, are not addressed in this article. For a list of all supported endpoints, see [Microsoft 365 URLs and IP address ranges](/microsoft-365/enterprise/urls-and-ip-address-ranges#microsoft-365-common-and-office-online).
99-
>In addition, other endpoints are required for Azure portal authentication. For more information, see [Azure portal URLs for proxy bypass](/azure/azure-portal/azure-portal-safelist-urls?tabs=public-cloud#azure-portal-urls-for-proxy-bypass).
99+
>In addition, other endpoints are required for Microsoft Entra admin center authentication. For more information, see [Microsoft Entra admin center URLs for proxy bypass](/azure/azure-portal/azure-portal-safelist-urls?tabs=public-cloud#azure-portal-urls-for-proxy-bypass).
100100
101101
### Azure AD Password Protection DC agent
102102

@@ -243,7 +243,7 @@ To install the Azure AD Password Protection proxy service, complete the followin
243243
>
244244
> You may also see MFA required if Azure Device Registration (which is used under the covers by Azure AD Password Protection) has been configured to globally require MFA. To workaround this requirement you may use a different account that supports MFA with one of the previous two authentication modes, or you may also temporarily relax the Azure Device Registration MFA requirement.
245245
>
246-
> To make this change, search for and select **Azure Active Directory** in the Azure portal, then select **Devices > Device Settings**. Set **Require Multi-Factor Auth to join devices** to *No*. Be sure to reconfigure this setting back to *Yes* once registration is complete.
246+
> To make this change, search for and select then select **Devices > Device Settings** in the Microsoft Entra admin center. Set **Require Multi-Factor Auth to join devices** to *No*. Be sure to reconfigure this setting back to *Yes* once registration is complete.
247247
>
248248
> We recommend that MFA requirements be bypassed for test purposes only.
249249

@@ -296,7 +296,7 @@ To install the Azure AD Password Protection proxy service, complete the followin
296296
>
297297
> You may also see MFA required if Azure Device Registration (which is used under the covers by Azure AD Password Protection) has been configured to globally require MFA. To workaround this requirement you may use a different account that supports MFA with one of the previous two authentication modes, or you may also temporarily relax the Azure Device Registration MFA requirement.
298298
>
299-
> To make this change, search for and select **Azure Active Directory** in the Azure portal, then select **Devices > Device Settings**. Set **Require Multi-Factor Auth to join devices** to *No*. Be sure to reconfigure this setting back to *Yes* once registration is complete.
299+
> To make this change, search for and select **Devices > Device Settings** in the Microsoft Entra admin center. Set **Require Multi-Factor Auth to join devices** to *No*. Be sure to reconfigure this setting back to *Yes* once registration is complete.
300300
>
301301
> We recommend that MFA requirements be bypassed for test purposes only.
302302

@@ -400,7 +400,7 @@ The software installation, or uninstallation, requires a restart. This requireme
400400

401401
The installation of on-prem Azure AD Password Protection is complete after the DC agent software is installed on a domain controller, and that computer is rebooted. No other configuration is required or possible. Password change events against the on-prem DCs use the configured banned password lists from Azure AD.
402402

403-
To enable on-prem Azure AD Password Protection from the Azure portal or configure custom banned passwords, see [Enable on-premises Azure AD Password Protection](howto-password-ban-bad-on-premises-operations.md).
403+
To enable on-prem Azure AD Password Protection or configure custom banned passwords, see [Enable on-premises Azure AD Password Protection](howto-password-ban-bad-on-premises-operations.md).
404404

405405
> [!TIP]
406406
> You can install the Azure AD Password Protection DC agent on a machine that's not yet a domain controller. In this case, the service starts and runs but remain inactive until the machine is promoted to be a domain controller.
@@ -436,4 +436,4 @@ The `Get-AzureADPasswordProtectionDCAgent` cmdlet may be used to query the softw
436436

437437
## Next steps
438438

439-
Now that you've installed the services that you need for Azure AD Password Protection on your on-premises servers, [enable on-prem Azure AD Password Protection in the Azure portal](howto-password-ban-bad-on-premises-operations.md) to complete your deployment.
439+
Now that you've installed the services that you need for Azure AD Password Protection on your on-premises servers, [enable on-prem Azure AD Password Protection](howto-password-ban-bad-on-premises-operations.md) to complete your deployment.

articles/active-directory/authentication/howto-registration-mfa-sspr-combined.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 06/08/2023
9+
ms.date: 09/14/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -38,7 +38,8 @@ For more information about creating trusted locations in Conditional Access, see
3838

3939
Complete the following steps to create a policy that applies to all selected users that attempt to register using the combined registration experience, and blocks access unless they are connecting from a location marked as trusted network:
4040

41-
1. In the **Azure portal**, browse to **Azure Active Directory** > **Security** > **Conditional Access**.
41+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Conditional Access Administrator](../roles/permissions-reference.md#conditional-access-administrator).
42+
1. Browse to **Protection** > **Conditional Access**.
4243
1. Select **+ New policy**.
4344
1. Enter a name for this policy, such as *Combined Security Info Registration on Trusted Networks*.
4445
1. Under **Assignments**, select **Users**. Choose the users and groups you want this policy to apply to.

articles/active-directory/authentication/howto-sspr-authenticationdata.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 04/26/2023
9+
ms.date: 09/14/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -45,9 +45,9 @@ After a user verifies their mobile phone number, the *Phone* field under **Authe
4545

4646
## Authentication contact info
4747

48-
On the **Authentication methods** page for an Azure AD user in the Azure portal, a Global Administrator can manually set the authentication contact information. You can review existing methods under the *Usable authentication methods* section, or **+Add authentication methods**, as shown in the following example screenshot:
48+
On the **Authentication methods** page for an Azure AD user in the Microsoft Entra admin center, a Global Administrator can manually set the authentication contact information. You can review existing methods under the *Usable authentication methods* section, or **+Add authentication methods**, as shown in the following example screenshot:
4949

50-
:::image type="content" source="media/howto-sspr-authenticationdata/user-authentication-contact-info.png" alt-text="Manage authentication methods from the Azure portal":::
50+
:::image type="content" source="media/howto-sspr-authenticationdata/user-authentication-contact-info.png" alt-text="Screenshot of how to manage authentication methods":::
5151

5252
The following considerations apply for this authentication contact info:
5353

articles/active-directory/authentication/howto-sspr-customization.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 02/01/2023
9+
ms.date: 09/14/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -69,7 +69,7 @@ The graphics you choose are shown in the following circumstances:
6969

7070
### Directory name
7171

72-
To make things look more user-friendly, you can change organization name in the portal and in the automated communications. To change the directory name attribute in the Azure portal, browse to **Azure Active Directory** > **Properties**. This friendly organization name option is the most visible in automated emails, as in the following examples:
72+
To make things look more user-friendly, you can change organization name in the portal and in the automated communications. To change the directory name attribute in the Microsoft Entra admin center, sign in as a Global Administrator and browse to **Identity** > **Overview** > **Properties**. This friendly organization name option is the most visible in automated emails, as in the following examples:
7373

7474
* The friendly name in the email, for example "*Microsoft on behalf of CONTOSO demo*"
7575
* The subject line in the email, for example "*CONTOSO demo account email verification code*"

articles/active-directory/authentication/howto-sspr-deployment.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -261,9 +261,7 @@ You can also refer to [Complete out an Azure AD self-service password reset pilo
261261

262262
### Plan support
263263

264-
While SSPR does not typically create user issues, it is important to prepare support staff to deal with issues that may arise. While an administrator can reset the password for end users through the Azure portal, it is better to help resolve the issue via a self-service support process.
265-
266-
To enable your support team's success, you can create a FAQ based on questions you receive from your users. Here are a few examples:
264+
While SSPR does not typically create user issues, it is important to prepare support staff to deal with issues that may arise. To enable your support team's success, you can create a FAQ based on questions you receive from your users. Here are a few examples:
267265

268266
| Scenarios| Description |
269267
| - | - |
@@ -319,10 +317,10 @@ Azure AD can provide additional information on your SSPR performance through aud
319317

320318
### Password management activity reports
321319

322-
You can use pre-built reports on Azure portal to measure the SSPR performance. If you're appropriately licensed, you can also create custom queries. For more information, see [Reporting options for Azure AD password management](./howto-sspr-reporting.md)
320+
You can use pre-built reports on Microsoft Entra admin center to measure the SSPR performance. If you're appropriately licensed, you can also create custom queries. For more information, see [Reporting options for Azure AD password management](./howto-sspr-reporting.md)
323321

324322
> [!NOTE]
325-
> You must be [a global administrator](../roles/permissions-reference.md), and you must opt-in for this data to be gathered for your organization. To opt in, you must visit the Reporting tab or the audit logs on the Azure portal at least once. Until then, the data doesn't collect for your organization.
323+
> You must be [a global administrator](../roles/permissions-reference.md), and you must opt-in for this data to be gathered for your organization. To opt in, you must visit the Reporting tab or the audit logs on the Microsoft Entra admin center at least once. Until then, the data doesn't collect for your organization.
326324
327325
Audit logs for registration and password reset are available for 30 days. If security auditing within your corporation requires longer retention, the logs need to be exported and consumed into a SIEM tool such as [Microsoft Sentinel](../../sentinel/connect-azure-active-directory.md), Splunk, or ArcSight.
328326

articles/active-directory/authentication/howto-sspr-reporting.md

Lines changed: 15 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: active-directory
55
ms.service: active-directory
66
ms.subservice: authentication
77
ms.topic: how-to
8-
ms.date: 01/29/2023
8+
ms.date: 09/14/2023
99
ms.author: justinha
1010
author: justinha
1111
manager: amycolannino
@@ -19,10 +19,10 @@ After deployment, many organizations want to know how or if self-service passwor
1919

2020
![Reporting on SSPR using the audit logs in Azure AD][Reporting]
2121

22-
The following questions can be answered by the reports that exist in the [Azure portal](https://portal.azure.com):
22+
The following questions can be answered by the reports that exist in the [Microsoft Entra admin center](https://entra.microsoft.com):
2323

2424
> [!NOTE]
25-
> You must be [a global administrator](../roles/permissions-reference.md), and you must opt-in for this data to be gathered on behalf of your organization. To opt in, you must visit the **Reporting** tab or the audit logs at least once. Until then, data is not collected for your organization.
25+
> You must be [a Global Administrator](../roles/permissions-reference.md), and you must opt-in for this data to be gathered on behalf of your organization. To opt in, you must visit the **Reporting** tab or the audit logs at least once. Until then, data is not collected for your organization.
2626
>
2727
2828
* How many people have registered for password reset?
@@ -34,16 +34,14 @@ The following questions can be answered by the reports that exist in the [Azure
3434
* What admins are resetting their own passwords frequently?
3535
* Is there any suspicious activity going on with password reset?
3636

37-
## How to view password management reports in the Azure portal
37+
## How to view password management reports
3838

3939
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
4040

41-
In the Azure portal experience, we have improved the way that you can view password reset and password reset registration activity. Use the following the steps to find the password reset and password reset registration events:
41+
Use the following the steps to find the password reset and password reset registration events:
4242

43-
1. Sign in to the [Azure portal](https://portal.azure.com).
44-
2. Select **All services** in the left pane.
45-
3. Search for **Azure Active Directory** in the list of services and select it.
46-
4. Select **Users** from the Manage section.
43+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Administrator](../roles/permissions-reference.md#global-administrator).
44+
1. Browse to **Identity** > **Users**.
4745
5. Select **Audit Logs** from the **Users** blade. This shows you all of the audit events that occurred against all the users in your directory. You can filter this view to see all the password-related events.
4846
6. From the **Filter** menu at the top of the pane, select the **Service** drop-down list, and change it to the **Self-service Password Management** service type.
4947
7. Optionally, further filter the list by choosing the specific **Activity** you're interested in.
@@ -52,18 +50,18 @@ In the Azure portal experience, we have improved the way that you can view passw
5250

5351
[Combined registration](./concept-registration-mfa-sspr-combined.md) security information registration and management events can be found in the audit logs under **Security** > **Authentication Methods**.
5452

55-
## Description of the report columns in the Azure portal
53+
## Description of the report columns
5654

57-
The following list explains each of the report columns in the Azure portal in detail:
55+
The following list explains each of the report columns in detail:
5856

5957
* **User**: The user who attempted a password reset registration operation.
6058
* **Role**: The role of the user in the directory.
6159
* **Date and Time**: The date and time of the attempt.
6260
* **Data Registered**: The authentication data that the user provided during password reset registration.
6361

64-
## Description of the report values in the Azure portal
62+
## Description of the report values
6563

66-
The following table describes the different values that are you can set for each column in the Azure portal:
64+
The following table describes the different values that are you can set for each column:
6765

6866
| Column | Permitted values and their meanings |
6967
| --- | --- |
@@ -75,10 +73,10 @@ The following activity types appear in the **Self-Service Password Management**
7573

7674
* [Blocked from self-service password reset](#activity-type-blocked-from-self-service-password-reset): Indicates that a user tried to reset a password, use a specific gate, or validate a phone number more than five total times in 24 hours.
7775
* [Change password (self-service)](#activity-type-change-password-self-service): Indicates that a user performed a voluntary, or forced (due to expiry) password change.
78-
* [Reset password (by admin)](#activity-type-reset-password-by-admin): Indicates that an administrator performed a password reset on behalf of a user from the Azure portal.
79-
* [Reset password (self-service)](#activity-type-reset-password-self-service): Indicates that a user successfully reset their password from the [Azure AD password reset portal](https://passwordreset.microsoftonline.com).
76+
* [Reset password (by admin)](#activity-type-reset-password-by-admin): Indicates that an administrator performed a password reset on behalf of a user.
77+
* [Reset password (self-service)](#activity-type-reset-password-self-service): Indicates that a user successfully reset their password from [Azure AD password reset](https://passwordreset.microsoftonline.com).
8078
* [Self-service password reset flow activity progress](#activity-type-self-serve-password-reset-flow-activity-progress): Indicates each specific step a user proceeds through, such as passing a specific password reset authentication gate, as part of the password reset process.
81-
* [Unlock user account (self-service)](#activity-type-unlock-a-user-account-self-service)): Indicates that a user successfully unlocked their Active Directory account without resetting their password from the [Azure AD password reset portal](https://passwordreset.microsoftonline.com) by using the Active Directory feature of account unlock without reset.
79+
* [Unlock user account (self-service)](#activity-type-unlock-a-user-account-self-service): Indicates that a user successfully unlocked their Active Directory account without resetting their password from the [Azure AD password reset portal](https://passwordreset.microsoftonline.com) by using the Active Directory feature of account unlock without reset.
8280
* [User registered for self-service password reset](#activity-type-user-registered-for-self-service-password-reset): Indicates that a user has registered all the required information to be able to reset their password in accordance with the currently specified tenant password reset policy.
8381

8482
### Activity type: Blocked from self-service password reset
@@ -109,7 +107,7 @@ The following list explains this activity in detail:
109107

110108
The following list explains this activity in detail:
111109

112-
* **Activity description**: Indicates that an administrator performed a password reset on behalf of a user from the Azure portal.
110+
* **Activity description**: Indicates that an administrator performed a password reset on behalf of a user.
113111
* **Activity actor**: The administrator who performed the password reset on behalf of another end user or administrator. Must be a password administrator, user administrator, or helpdesk administrator.
114112
* **Activity target**: The user whose password was reset. The user can be an end user or a different administrator.
115113
* **Activity statuses**:

0 commit comments

Comments
 (0)