Skip to content

Commit 6f5ba11

Browse files
BuildFixes
1 parent 0da821f commit 6f5ba11

File tree

2 files changed

+3
-6
lines changed

2 files changed

+3
-6
lines changed

articles/active-directory/conditional-access/how-to-policy-mfa-admin-portals.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -17,10 +17,7 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Common Conditional Access policy: Require multifactor authentication for admins accessing Microsoft admin portals
1919

20-
Microsoft recommends securing access to any Microsoft admin portals like Microsoft Entra, Microsoft 365, Exchange, and Azure. Using the [Microsoft Admin Portals (Preview)](concept-conditional-access-cloud-apps.md#microsoft-admin-portals-preview) app organizations can control interactive access to Microsoft admin portals.
21-
22-
> [!IMPORTANT]
23-
> Microsoft Admin Poratls (preview) is not currently supported in Government clouds.
20+
Microsoft recommends securing access to any Microsoft admin portals like Microsoft Entra, Microsoft 365, Exchange, and Azure. Using the [Microsoft Admin Portals](concept-conditional-access-cloud-apps.md#microsoft-admin-portals) app organizations can control interactive access to Microsoft admin portals.
2421

2522
## User exclusions
2623
[!INCLUDE [active-directory-policy-exclusions](../../../includes/active-directory-policy-exclude-user.md)]
@@ -53,7 +50,7 @@ Microsoft recommends securing access to any Microsoft admin portals like Microso
5350
> Conditional Access policies support built-in roles. Conditional Access policies are not enforced for other role types including [administrative unit-scoped](../roles/admin-units-assign-roles.md) or [custom roles](../roles/custom-create.md).
5451
5552
1. Under **Exclude**, select **Users and groups** and choose your organization's emergency access or break-glass accounts.
56-
1. Under **Target resources** > **Cloud apps** > **Include**, **Select apps**, select **Microsoft Admin Portals (Preview)**.
53+
1. Under **Target resources** > **Cloud apps** > **Include**, **Select apps**, select **Microsoft Admin Portals**.
5754
1. Under **Access controls** > **Grant**, select **Grant access**, **Require authentication strength**, select **Multifactor authentication**, then select **Select**.
5855
1. Confirm your settings and set **Enable policy** to **Report-only**.
5956
1. Select **Create** to create to enable your policy.

articles/active-directory/fundamentals/whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -112,7 +112,7 @@ When a Conditional Access policy targets the Microsoft Admin Portals cloud app,
112112
- Microsoft Intune admin center
113113
- Microsoft Purview compliance portal
114114

115-
For more information, see: [Microsoft Admin Portals (preview)](../conditional-access/concept-conditional-access-cloud-apps.md#microsoft-admin-portals-preview).
115+
For more information, see: [Microsoft Admin Portals](../conditional-access/concept-conditional-access-cloud-apps.md#microsoft-admin-portals).
116116

117117
---
118118

0 commit comments

Comments
 (0)