You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/concept-fundamentals-block-legacy-authentication.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: conditional-access
8
8
ms.topic: conceptual
9
-
ms.date: 10/15/2019
9
+
ms.date: 12/06/2019
10
10
11
11
ms.author: joflore
12
12
author: MicrosoftGuyJFlo
@@ -97,4 +97,4 @@ Steps for enabling modern authentication can be found in the following articles:
97
97
98
98
-[How to configure Exchange Server on-premises to use Hybrid Modern Authentication](https://docs.microsoft.com/office365/enterprise/configure-exchange-server-for-hybrid-modern-authentication)
99
99
-[How to use Modern Authentication (ADAL) with Skype for Business](https://docs.microsoft.com/skypeforbusiness/manage/authentication/use-adal)
There are multiple ways to enable Azure Multi-Factor Authentication (MFA) for your Azure Active Directory (AD) users based on the licenses that your organization owns.
21
21
22
-

22
+

23
23
24
24
Based on our studies, your account is more than 99.9% less likely to be compromised if you use MFA.
25
25
26
26
So how does your organization turn on multi-factor authentication even for free, before becoming a statistic?
27
27
28
28
## Free option
29
29
30
-
Customers who are utilizing the free benefits of Azure AD can use [security defaults](../conditional-access/concept-conditional-access-security-defaults.md) to enable multi-factor authentication in their environment.
30
+
Customers who are utilizing the free benefits of Azure AD can use [security defaults](../fundamentals/concept-fundamentals-security-defaults.md) to enable multi-factor authentication in their environment.
31
31
32
32
## Office 365
33
33
34
34
For customers with Office 365, there are two options:
35
35
36
-
-[Security defaults](../conditional-access/concept-conditional-access-security-defaults.md) can be enabled through Azure AD to protect all of your users with Azure Multi-Factor Authentication.
36
+
-[Security defaults](concept-fundamentals-security-defaults.md) can be enabled through Azure AD to protect all of your users with Azure Multi-Factor Authentication.
37
37
- If your organization requires more granularity in providing multi-factor authentication, your Office licenses include [per-user MFA](../authentication/howto-mfa-userstates.md) capabilities. Per-user MFA is enabled and enforced on each user individually by administrators.
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/concept-fundamentals-security-defaults.md
+10-12Lines changed: 10 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: conditional-access
8
8
ms.topic: conceptual
9
-
ms.date: 10/23/2019
9
+
ms.date: 12/06/2019
10
10
11
11
ms.author: joflore
12
12
author: MicrosoftGuyJFlo
@@ -23,7 +23,7 @@ Security defaults in Azure Active Directory (Azure AD) make it easier to be secu
23
23
24
24
Microsoft is making security defaults available to everyone. The goal is to ensure that all organizations have a basic level of security enabled at no extra cost. You turn on security defaults in the Azure portal.
25
25
26
-

26
+

27
27
28
28
The following security configurations will be turned on in your tenant.
29
29
@@ -97,20 +97,20 @@ Mail clients use older authentication protocols (like IMAP, SMTP, and POP3) to m
97
97
To ensure that Multi-Factor Authentication is required for signing in to an administrative account and that attackers can't bypass it, security defaults block all authentication requests made to administrator accounts from older protocols.
98
98
99
99
> [!WARNING]
100
-
> Before you enable this setting, make sure your administrators aren't using older authentication protocols. For more information, see [How to move away from legacy authentication](concept-conditional-access-block-legacy-authentication.md).
100
+
> Before you enable this setting, make sure your administrators aren't using older authentication protocols. For more information, see [How to move away from legacy authentication](concept-fundamentals-block-legacy-authentication.md).
101
101
102
102
### Conditional Access
103
103
104
104
You can use Conditional Access to configure policies that provide the same behavior enabled by security defaults. If you're using Conditional Access and have Conditional Access policies enabled in your environment, security defaults won't be available to you. If you have a license that provides Conditional Access but don't have any Conditional Access policies enabled in your environment, you are welcome to use security defaults until you enable Conditional Access policies.
105
105
106
-

106
+

107
107
108
108
Here are step-by-step guides on how you can use Conditional Access to configure equivalent policies:
109
109
110
-
-[Require MFA for administrators](howto-conditional-access-policy-admin-mfa.md)
111
-
-[Require MFA for Azure management](howto-conditional-access-policy-azure-management.md)
0 commit comments