Skip to content

Commit 499f8da

Browse files
authored
Merge pull request #207743 from MicrosoftGuyJFlo/SecurityDefaultsB2B
[Azure AD] Security Defaults - B2B callout
2 parents a5a18c6 + ce9b0a8 commit 499f8da

File tree

1 file changed

+5
-1
lines changed

1 file changed

+5
-1
lines changed

articles/active-directory/fundamentals/concept-fundamentals-security-defaults.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ Security defaults make it easier to help protect your organization from these id
4242

4343
## Enabling security defaults
4444

45-
If your tenant was created on or after October 22, 2019, security defaults may be enabled in your tenant. To protect all of our users, security defaults are being rolled out to all new tenants at creation.
45+
If your tenant was created on or after October 22, 2019, security defaults may be enabled in your tenant. To protect all of our users, security defaults are being rolled out to all new tenants at creation.
4646

4747
To enable security defaults in your directory:
4848

@@ -175,6 +175,10 @@ You may choose to [disable password expiration](../authentication/concept-sspr-p
175175

176176
For more detailed information about emergency access accounts, see the article [Manage emergency access accounts in Azure AD](../roles/security-emergency-access.md).
177177

178+
### B2B guest users
179+
180+
Any B2B Guest users that access your directory will be subject to the same controls as your organization's users.
181+
178182
### Disabled MFA status
179183

180184
If your organization is a previous user of per-user based Azure AD Multi-Factor Authentication, don't be alarmed to not see users in an **Enabled** or **Enforced** status if you look at the Multi-Factor Auth status page. **Disabled** is the appropriate status for users who are using security defaults or Conditional Access based Azure AD Multi-Factor Authentication.

0 commit comments

Comments
 (0)