Skip to content

Commit 5a90cc0

Browse files
Merge pull request #248461 from Justinha/rsa
added info about custom voice and default
2 parents 8ef8669 + bc43f9a commit 5a90cc0

File tree

2 files changed

+11
-5
lines changed

2 files changed

+11
-5
lines changed

articles/active-directory/authentication/concept-authentication-default-enablement.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 06/22/2023
9+
ms.date: 08/16/2023
1010

1111
ms.author: justinha
1212
author: mjsantani
@@ -58,6 +58,7 @@ The following table lists each setting that can be set to Microsoft managed and
5858
| [Application name in Microsoft Authenticator notifications](how-to-mfa-additional-context.md) | Disabled |
5959
| [System-preferred MFA](concept-system-preferred-multifactor-authentication.md) | Enabled |
6060
| [Authenticator Lite](how-to-mfa-authenticator-lite.md) | Enabled |
61+
| [Report suspicious activity](howto-mfa-mfasettings.md#report-suspicious-activity) | Disabled |
6162

6263
As threat vectors change, Azure AD may announce default protection for a **Microsoft managed** setting in [release notes](../fundamentals/whats-new.md) and on commonly read forums like [Tech Community](https://techcommunity.microsoft.com/). For example, see our blog post [It's Time to Hang Up on Phone Transports for Authentication](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/it-s-time-to-hang-up-on-phone-transports-for-authentication/ba-p/1751752) for more information about the need to move away from using SMS and voice calls, which led to default enablement for the registration campaign to help users to set up Authenticator for modern authentication.
6364

articles/active-directory/authentication/howto-mfa-mfasettings.md

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,12 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 07/17/2023
9+
ms.date: 08/16/2023
1010

1111
ms.author: justinha
1212
author: justinha
1313
manager: amycolannino
14-
ms.reviewer: michmcla
14+
ms.reviewer: jupetter
1515

1616
ms.collection: M365-identity-device-management
1717
ms.custom: contperf-fy20q4
@@ -87,11 +87,16 @@ To unblock a user, complete the following steps:
8787

8888
Users who report an MFA prompt as suspicious are set to **High User Risk**. Administrators can use risk-based policies to limit access for these users, or enable self-service password reset (SSPR) for users to remediate problems on their own. If you previously used the **Fraud Alert** automatic blocking feature and don't have an Azure AD P2 license for risk-based policies, you can use risk detection events to identify and disable impacted users and automatically prevent their sign-in. For more information about using risk-based policies, see [Risk-based access policies](../identity-protection/concept-identity-protection-policies.md).
8989

90-
To enable **Report suspicious activity** from the Authentication Methods Settings:
90+
To enable **Report suspicious activity** from the Authentication methods **Settings**:
9191

9292
1. In the Azure portal, click **Azure Active Directory** > **Security** > **Authentication Methods** > **Settings**.
93-
1. Set **Report suspicious activity** to **Enabled**.
93+
1. Set **Report suspicious activity** to **Enabled**. The feature remains disabled if you choose **Microsoft managed**. For more information about Microsoft managed values, see [Protecting authentication methods in Azure Active Directory](concept-authentication-default-enablement.md).
9494
1. Select **All users** or a specific group.
95+
1. Select a **Reporting code**.
96+
1. Click **Save**.
97+
98+
>[!NOTE]
99+
>If you enable **Report suspicious activity** and specify a custom voice reporting value while the tenant still has **Fraud Alert** enabled in parallel with a custom voice reporting number configured, the **Report suspicious activity** value will be used instead of **Fraud Alert**.
95100
96101
### View suspicious activity events
97102

0 commit comments

Comments
 (0)