Skip to content

Commit 758a01d

Browse files
authored
Merge pull request #207175 from yoelhor/patch-295
[Azure AD - CA] Update to latest Azure Portal UI
2 parents aeb43eb + b445998 commit 758a01d

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

articles/active-directory/authentication/howto-mfa-mfasettings.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 06/20/2022
9+
ms.date: 08/07/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -47,7 +47,7 @@ The following settings are available:
4747
To configure account lockout settings, complete these steps:
4848

4949
1. Sign in to the [Azure portal](https://portal.azure.com) as an administrator.
50-
1. Go to **Azure Active Directory** > **Security** > **MFA** > **Account lockout**.
50+
1. Go to **Azure Active Directory** > **Security** > **Multifactor authentication** > **Account lockout**.
5151
1. Enter the values for your environment, and then select **Save**.
5252

5353
![Screenshot that shows the account lockout settings in the Azure portal.](./media/howto-mfa-mfasettings/account-lockout-settings.png)
@@ -62,7 +62,7 @@ To block a user, complete the following steps.
6262

6363
[Watch a short video that describes this process.](https://www.youtube.com/watch?v=WdeE1On4S1o&feature=youtu.be)
6464

65-
1. Browse to **Azure Active Directory** > **Security** > **MFA** > **Block/unblock users**.
65+
1. Browse to **Azure Active Directory** > **Security** > **Multifactor authentication** > **Block/unblock users**.
6666
1. Select **Add** to block a user.
6767
1. Enter the user name for the blocked user in the format `[email protected]`, and then provide a comment in the **Reason** box.
6868
1. Select **OK** to block the user.
@@ -71,7 +71,7 @@ To block a user, complete the following steps.
7171

7272
To unblock a user, complete the following steps:
7373

74-
1. Go to **Azure Active Directory** > **Security** > **MFA** > **Block/unblock users**.
74+
1. Go to **Azure Active Directory** > **Security** > **Multifactor authentication** > **Block/unblock users**.
7575
1. In the **Action** column next to the user, select **Unblock**.
7676
1. Enter a comment in the **Reason for unblocking** box.
7777
1. Select **OK** to unblock the user.
@@ -90,7 +90,7 @@ The following fraud alert configuration options are available:
9090
9191
To enable and configure fraud alerts, complete the following steps:
9292

93-
1. Go to **Azure Active Directory** > **Security** > **MFA** > **Fraud alert**.
93+
1. Go to **Azure Active Directory** > **Security** > **Multifactor authentication** > **Fraud alert**.
9494
1. Set **Allow users to submit fraud alerts** to **On**.
9595
1. Configure the **Automatically block users who report fraud** or **Code to report fraud during initial greeting** setting as needed.
9696
1. Select **Save**.
@@ -138,7 +138,7 @@ [email protected],1234567,1234567abcdef1234567abcdef,60,Contoso,HardwareKey
138138
> [!NOTE]
139139
> Be sure to include the header row in your CSV file.
140140
141-
An administrator can sign in to the Azure portal, go to **Azure Active Directory > Security > MFA > OATH tokens**, and upload the CSV file.
141+
An administrator can sign in to the Azure portal, go to **Azure Active Directory** > **Security** > **Multifactor authentication** > **OATH tokens**, and upload the CSV file.
142142

143143
Depending on the size of the CSV file, it might take a few minutes to process. Select **Refresh** to get the status. If there are any errors in the file, you can download a CSV file that lists them. The field names in the downloaded CSV file are different from those in the uploaded version.
144144

@@ -159,7 +159,7 @@ In the United States, if you haven't configured MFA caller ID, voice calls from
159159
160160
To configure your own caller ID number, complete the following steps:
161161

162-
1. Go to **Azure Active Directory** > **Security** > **MFA** > **Phone call settings**.
162+
1. Go to **Azure Active Directory** > **Security** > **Multifactor authentication** > **Phone call settings**.
163163
1. Set the **MFA caller ID number** to the number you want users to see on their phones. Only US-based numbers are allowed.
164164
1. Select **Save**.
165165

@@ -217,7 +217,7 @@ You can use the following sample scripts to create your own custom messages. The
217217

218218
To use your own custom messages, complete the following steps:
219219

220-
1. Go to **Azure Active Directory** > **Security** > **MFA** > **Phone call settings**.
220+
1. Go to **Azure Active Directory** > **Security** > **Multifactor authentication** > **Phone call settings**.
221221
1. Select **Add greeting**.
222222
1. Choose the **Type** of greeting, such as **Greeting (standard)** or **Authentication successful**.
223223
1. Select the **Language**. See the previous section on [custom message language behavior](#custom-message-language-behavior).
@@ -228,7 +228,7 @@ To use your own custom messages, complete the following steps:
228228

229229
Settings for app passwords, trusted IPs, verification options, and remembering multi-factor authentication on trusted devices are available in the service settings. This is a legacy portal. It isn't part of the regular Azure AD portal.
230230

231-
You can access service settings from the Azure portal by going to **Azure Active Directory** > **Security** > **MFA** > **Getting started** > **Configure** > **Additional cloud-based MFA settings**. A window or tab opens with additional service settings options.
231+
You can access service settings from the Azure portal by going to **Azure Active Directory** > **Security** > **Multifactor authentication** > **Getting started** > **Configure** > **Additional cloud-based MFA settings**. A window or tab opens with additional service settings options.
232232

233233
### Trusted IPs
234234

@@ -375,4 +375,4 @@ After you enable the **remember multi-factor authentication** feature, users can
375375

376376
## Next steps
377377

378-
To learn more, see [What authentication and verification methods are available in Azure Active Directory?](concept-authentication-methods.md)
378+
To learn more, see [What authentication and verification methods are available in Azure Active Directory?](concept-authentication-methods.md)

0 commit comments

Comments
 (0)