Skip to content

Commit 75b1789

Browse files
authored
Update howto-identity-protection-configure-risk-policies.md
correct password reset to password writeback
1 parent 739ef8d commit 75b1789

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/active-directory/identity-protection/howto-identity-protection-configure-risk-policies.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ Configured trusted [network locations](../conditional-access/location-condition.
3737
Organizations can choose to block access when risk is detected. Blocking sometimes stops legitimate users from doing what they need to. A better solution is to allow self-remediation using Azure AD multifactor authentication (MFA) and secure password change.
3838

3939
> [!WARNING]
40-
> Users must register for Azure AD MFA and SSPR before they face a situation requiring remediation. Users not registered are blocked and require administrator intervention.
40+
> Users must register for Azure AD MFA and password writeback before they face a situation requiring remediation. Users not registered are blocked and require administrator intervention.
4141
>
4242
> Password change (I know my password and want to change it to something new) outside of the risky user policy remediation flow does not meet the requirement for secure password change.
4343
@@ -46,7 +46,7 @@ Organizations can choose to block access when risk is detected. Blocking sometim
4646
Microsoft recommends the below risk policy configurations to protect your organization:
4747

4848
- User risk policy
49-
- Require a secure password change when user risk level is **High**. Azure AD MFA is required before the user can create a new password with SSPR to remediate their risk.
49+
- Require a secure password change when user risk level is **High**. Azure AD MFA is required before the user can create a new password with password writeback to remediate their risk.
5050
- Sign-in risk policy
5151
- Require Azure AD MFA when sign-in risk level is **Medium** or **High**, allowing users to prove it's them by using one of their registered authentication methods, remediating the sign-in risk.
5252

0 commit comments

Comments
 (0)