Skip to content

Commit 59fc499

Browse files
authored
Merge pull request #98278 from MicrosoftGuyJFlo/FundamentalsContentMove
[Azure AD] Fundamentals - Content move
2 parents 33536dc + 2674137 commit 59fc499

11 files changed

+39
-22
lines changed

.openpublishing.redirection.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34101,6 +34101,21 @@
3410134101
"redirect_url": "/azure/active-directory-b2c/tutorial-create-tenant",
3410234102
"redirect_document_id": false
3410334103
},
34104+
{
34105+
"source_path": "articles/active-directory/authentication/concept-mfa-get-started.md",
34106+
"redirect_url": "/azure/active-directory/fundamentals/concept-fundamentals-mfa-get-started",
34107+
"redirect_document_id": true
34108+
},
34109+
{
34110+
"source_path": "articles/active-directory/conditional-access/concept-conditional-access-block-legacy-authentication.md",
34111+
"redirect_url": "/azure/active-directory/fundamentals/concept-fundamentals-block-legacy-authentication",
34112+
"redirect_document_id": true
34113+
},
34114+
{
34115+
"source_path": "articles/active-directory/conditional-access/concept-conditional-access-security-defaults.md",
34116+
"redirect_url": "/azure/active-directory/fundamentals/concept-fundamentals-security-defaults",
34117+
"redirect_document_id": true
34118+
},
3410434119
{
3410534120
"source_path": "articles/multi-factor-authentication/end-user/multi-factor-authentication-end-user-app-passwords.experimental.md",
3410634121
"redirect_url": "/azure/active-directory/user-help/multi-factor-authentication-end-user-app-passwords",

articles/active-directory/authentication/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,8 +43,6 @@
4343
items:
4444
- name: How MFA works
4545
href: concept-mfa-howitworks.md
46-
- name: Enable MFA
47-
href: concept-mfa-get-started.md
4846
- name: License your users
4947
href: concept-mfa-licensing.md
5048
- name: Manage an Auth Provider

articles/active-directory/conditional-access/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,8 +17,6 @@
1717
items:
1818
- name: Common Conditional Access policies
1919
href: concept-conditional-access-policy-common.md
20-
- name: Security defaults
21-
href: concept-conditional-access-security-defaults.md
2220
- name: Conditional Access policy components
2321
href: concept-conditional-access-policies.md
2422
- name: Conditions
Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 10/15/2019
9+
ms.date: 12/06/2019
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -97,4 +97,4 @@ Steps for enabling modern authentication can be found in the following articles:
9797

9898
- [How to configure Exchange Server on-premises to use Hybrid Modern Authentication](https://docs.microsoft.com/office365/enterprise/configure-exchange-server-for-hybrid-modern-authentication)
9999
- [How to use Modern Authentication (ADAL) with Skype for Business](https://docs.microsoft.com/skypeforbusiness/manage/authentication/use-adal)
100-
- [Block legacy authentication](block-legacy-authentication.md)
100+
- [Block legacy authentication](../conditional-access/block-legacy-authentication.md)

articles/active-directory/authentication/concept-mfa-get-started.md renamed to articles/active-directory/fundamentals/concept-fundamentals-mfa-get-started.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 10/29/2019
9+
ms.date: 12/06/2019
1010

1111
ms.author: iainfou
1212
author: iainfoulds
@@ -19,21 +19,21 @@ ms.collection: M365-identity-device-management
1919

2020
There are multiple ways to enable Azure Multi-Factor Authentication (MFA) for your Azure Active Directory (AD) users based on the licenses that your organization owns.
2121

22-
![Investigate signals and enforce MFA if needed](./media/concept-mfa-get-started/verify-signals-and-perform-mfa-if-required.png)
22+
![Investigate signals and enforce MFA if needed](./media/concept-fundamentals-mfa-get-started/verify-signals-and-perform-mfa-if-required.png)
2323

2424
Based on our studies, your account is more than 99.9% less likely to be compromised if you use MFA.
2525

2626
So how does your organization turn on multi-factor authentication even for free, before becoming a statistic?
2727

2828
## Free option
2929

30-
Customers who are utilizing the free benefits of Azure AD can use [security defaults](../conditional-access/concept-conditional-access-security-defaults.md) to enable multi-factor authentication in their environment.
30+
Customers who are utilizing the free benefits of Azure AD can use [security defaults](../fundamentals/concept-fundamentals-security-defaults.md) to enable multi-factor authentication in their environment.
3131

3232
## Office 365
3333

3434
For customers with Office 365, there are two options:
3535

36-
- [Security defaults](../conditional-access/concept-conditional-access-security-defaults.md) can be enabled through Azure AD to protect all of your users with Azure Multi-Factor Authentication.
36+
- [Security defaults](concept-fundamentals-security-defaults.md) can be enabled through Azure AD to protect all of your users with Azure Multi-Factor Authentication.
3737
- If your organization requires more granularity in providing multi-factor authentication, your Office licenses include [per-user MFA](../authentication/howto-mfa-userstates.md) capabilities. Per-user MFA is enabled and enforced on each user individually by administrators.
3838

3939
## Azure AD Premium P1
Lines changed: 10 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 10/23/2019
9+
ms.date: 12/06/2019
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -23,7 +23,7 @@ Security defaults in Azure Active Directory (Azure AD) make it easier to be secu
2323

2424
Microsoft is making security defaults available to everyone. The goal is to ensure that all organizations have a basic level of security enabled at no extra cost. You turn on security defaults in the Azure portal.
2525

26-
![Screenshot of the Azure portal with the toggle to enable security defaults](./media/concept-conditional-access-security-defaults/security-defaults-azure-ad-portal.png)
26+
![Screenshot of the Azure portal with the toggle to enable security defaults](./media/concept-fundamentals-security-defaults/security-defaults-azure-ad-portal.png)
2727

2828
The following security configurations will be turned on in your tenant.
2929

@@ -97,20 +97,20 @@ Mail clients use older authentication protocols (like IMAP, SMTP, and POP3) to m
9797
To ensure that Multi-Factor Authentication is required for signing in to an administrative account and that attackers can't bypass it, security defaults block all authentication requests made to administrator accounts from older protocols.
9898

9999
> [!WARNING]
100-
> Before you enable this setting, make sure your administrators aren't using older authentication protocols. For more information, see [How to move away from legacy authentication](concept-conditional-access-block-legacy-authentication.md).
100+
> Before you enable this setting, make sure your administrators aren't using older authentication protocols. For more information, see [How to move away from legacy authentication](concept-fundamentals-block-legacy-authentication.md).
101101
102102
### Conditional Access
103103

104104
You can use Conditional Access to configure policies that provide the same behavior enabled by security defaults. If you're using Conditional Access and have Conditional Access policies enabled in your environment, security defaults won't be available to you. If you have a license that provides Conditional Access but don't have any Conditional Access policies enabled in your environment, you are welcome to use security defaults until you enable Conditional Access policies.
105105

106-
![Warning message that you can have security defaults or Conditional Access not both](./media/concept-conditional-access-security-defaults/security-defaults-conditional-access.png)
106+
![Warning message that you can have security defaults or Conditional Access not both](./media/concept-fundamentals-security-defaults/security-defaults-conditional-access.png)
107107

108108
Here are step-by-step guides on how you can use Conditional Access to configure equivalent policies:
109109

110-
- [Require MFA for administrators](howto-conditional-access-policy-admin-mfa.md)
111-
- [Require MFA for Azure management](howto-conditional-access-policy-azure-management.md)
112-
- [Block legacy authentication](howto-conditional-access-policy-block-legacy.md)
113-
- [Require MFA for all users](howto-conditional-access-policy-all-users-mfa.md)
110+
- [Require MFA for administrators](../conditional-access/howto-conditional-access-policy-admin-mfa.md)
111+
- [Require MFA for Azure management](../conditional-access/howto-conditional-access-policy-azure-management.md)
112+
- [Block legacy authentication](../conditional-access/howto-conditional-access-policy-block-legacy.md)
113+
- [Require MFA for all users](../conditional-access/howto-conditional-access-policy-all-users-mfa.md)
114114
- [Require Azure MFA registration](../identity-protection/howto-identity-protection-configure-mfa-policy.md) - Requires Azure AD Identity Protection
115115

116116
## Enabling security defaults
@@ -127,7 +127,7 @@ To enable security defaults in your directory:
127127

128128
Organizations that choose to implement Conditional Access policies that replace security defaults must disable security defaults.
129129

130-
![Warning message disable security defaults to enable Conditional Access](./media/concept-conditional-access-security-defaults/security-defaults-disable-before-conditional-access.png)
130+
![Warning message disable security defaults to enable Conditional Access](./media/concept-fundamentals-security-defaults/security-defaults-disable-before-conditional-access.png)
131131

132132
To disable security defaults in your directory:
133133

@@ -139,6 +139,4 @@ To disable security defaults in your directory:
139139

140140
## Next steps
141141

142-
[Common Conditional Access policies](concept-conditional-access-policy-common.md)
143-
144-
[What is Conditional Access?](overview.md)
142+
[Common Conditional Access policies](../conditional-access/concept-conditional-access-policy-common.md)

0 commit comments

Comments
 (0)