Skip to content

Commit 7cbd850

Browse files
authored
Merge pull request #251393 from Justinha/steps-auth-7
revised portal steps
2 parents 1e9ec91 + 01f17bd commit 7cbd850

File tree

4 files changed

+20
-18
lines changed

4 files changed

+20
-18
lines changed

articles/active-directory/authentication/howto-password-ban-bad-on-premises-deploy.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Plan and deploy on-premises Azure Active Directory Password Protection
1919

20-
Users often create passwords that use common local words such as a school, sports team, or famous person. These passwords are easy to guess, and weak against dictionary-based attacks. To enforce strong passwords in your organization, Azure Active Directory (Azure AD) Password Protection provides a global and custom banned password list. A password change request fails if there's a match in these banned password list.
20+
Users often create passwords that use common local words such as a school, sports team, or famous person. These passwords are easy to guess, and weak against dictionary-based attacks. To enforce strong passwords in your organization, Azure Active Directory (Azure AD) Password Protection provides a global and custom banned password list. A password change request fails if there's a match in this banned password list.
2121

2222
To protect your on-premises Active Directory Domain Services (AD DS) environment, you can install and configure Azure AD Password Protection to work with your on-prem DC. This article shows you how to install and register the Azure AD Password Protection proxy service and Azure AD Password Protection DC agent in your on-premises environment.
2323

@@ -243,7 +243,7 @@ To install the Azure AD Password Protection proxy service, complete the followin
243243
>
244244
> You may also see MFA required if Azure Device Registration (which is used under the covers by Azure AD Password Protection) has been configured to globally require MFA. To workaround this requirement you may use a different account that supports MFA with one of the previous two authentication modes, or you may also temporarily relax the Azure Device Registration MFA requirement.
245245
>
246-
> To make this change, search for and select then select **Devices > Device Settings** in the Microsoft Entra admin center. Set **Require Multi-Factor Auth to join devices** to *No*. Be sure to reconfigure this setting back to *Yes* once registration is complete.
246+
> To make this change, select **Identity** in the [Microsoft Entra admin center](https://entra.microsoft.com), then select **Devices** > **Device Settings**. Set **Require Multi-Factor Auth to join devices** to *No*. Be sure to reconfigure this setting back to *Yes* once registration is complete.
247247
>
248248
> We recommend that MFA requirements be bypassed for test purposes only.
249249

@@ -296,7 +296,7 @@ To install the Azure AD Password Protection proxy service, complete the followin
296296
>
297297
> You may also see MFA required if Azure Device Registration (which is used under the covers by Azure AD Password Protection) has been configured to globally require MFA. To workaround this requirement you may use a different account that supports MFA with one of the previous two authentication modes, or you may also temporarily relax the Azure Device Registration MFA requirement.
298298
>
299-
> To make this change, search for and select **Devices > Device Settings** in the Microsoft Entra admin center. Set **Require Multi-Factor Auth to join devices** to *No*. Be sure to reconfigure this setting back to *Yes* once registration is complete.
299+
> To make this change, select **Identity** in the [Microsoft Entra admin center](https://entra.microsoft.com), then select **Devices** > **Device Settings**. Set **Require Multi-Factor Auth to join devices** to *No*. Be sure to reconfigure this setting back to *Yes* once registration is complete.
300300
>
301301
> We recommend that MFA requirements be bypassed for test purposes only.
302302

articles/active-directory/authentication/howto-password-ban-bad-on-premises-faq.yml

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ sections:
3333
3434
On-premises Azure AD Password Protection is supported in both Azure Global and Azure Government clouds.
3535
36-
The Azure portal does allow modification of the on-premises-specific "Password protection for Windows Server Active Directory" configuration even in non-supported clouds; such changes will be persisted but otherwise will never take effect. Registration of on-premises proxy agents or forests is unsupported in non-supported clouds, and any such registration attempts will always fail.
36+
The Microsoft Entra admin center does allow modification of the on-premises-specific "Password protection for Windows Server Active Directory" configuration even in non-supported clouds; such changes will be persisted but otherwise will never take effect. Registration of on-premises proxy agents or forests is unsupported in non-supported clouds, and any such registration attempts will always fail.
3737
3838
### How can I apply Azure AD Password Protection benefits to a subset of my on-premises users?
3939
@@ -79,7 +79,7 @@ sections:
7979
8080
### How can I modify the contents of the policy at the Active Directory level?
8181
82-
Not supported. The policy can only be administered using the Azure portal. Also see previous question.
82+
Not supported. The policy can only be administered using the Microsoft Entra admin center. Also see previous question.
8383
8484
### Why is DFSR required for sysvol replication?
8585
@@ -142,7 +142,7 @@ sections:
142142
143143
### Why is custom smart lockout not working even after the agents are installed in my on-premises Active Directory environment?
144144
145-
Custom smart lockout is only supported in Azure AD. Changes to the custom smart lockout settings in the Azure portal have no effect on the on-premises Active Directory environment, even with the agents installed.
145+
Custom smart lockout is only supported in Azure AD. Changes to the custom smart lockout settings in the Microsoft Entra admin center have no effect on the on-premises Active Directory environment, even with the agents installed.
146146
147147
### Is a System Center Operations Manager management pack available for Azure AD Password Protection?
148148
@@ -192,8 +192,9 @@ sections:
192192
net.exe user ContosoUser /add <password>
193193
```
194194
195-
1. Open a web browser (you may need to use a separate device instead of your domain controller), sign in to the [Azure portal](https://portal.azure.com), and browse to Azure Active Directory > Security > Authentication methods > Password protection.
196-
1. Modify the Azure AD Password Protection policy as needed for the testing you want to perform. For example, you may decide to configure either Enforced or Audit Mode, or you may decide to modify the list of banned terms in your custom banned passwords list.
195+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Administrator](../roles/permissions-reference.md#authentication-administrator).
196+
1. Browse to Protection > Authentication methods > Password protection.
197+
1. Modify the Azure AD Password Protection policy as needed for the testing you want to perform. For example, you may decide to configure either Enforced or Audit Mode, or you may decide to modify the list of banned terms in your custom banned passwords list.
197198
1. Synchronize the new policy by stopping and restarting the DC agent service.
198199
199200
This step can be accomplished in various ways. One way would be to use the Service Management administrative console, by right-clicking on the Azure AD Password Protection DC Agent service and choosing "Restart". Another way may be performed from the command prompt window like so:
@@ -290,7 +291,7 @@ sections:
290291
FullName:
291292
```
292293
293-
1. Continue testing various passwords of your choice and checking the results in the event viewer using the procedures outlined in the previous steps. If you need to change the policy in the Azure portal, don't forget to synchronize the new policy down to the DC agent as described earlier.
294+
1. Continue testing various passwords of your choice and checking the results in the event viewer using the procedures outlined in the previous steps. If you need to change the policy in the Microsoft Entra admin center, don't forget to synchronize the new policy down to the DC agent as described earlier.
294295
295296
We've covered procedures that enable you to do controlled testing of Azure AD Password Protection's password validation behavior. Resetting user passwords from the command line directly on a domain controller may seem an odd means of doing such testing, but as described previously it is designed to produce repeatable results. As you are testing various passwords, keep the [password evaluation algorithm](concept-password-ban-bad.md#how-are-passwords-evaluated) in mind as it may help to explain results that you did not expect.
296297

articles/active-directory/authentication/howto-password-ban-bad-on-premises-operations.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 01/29/2023
9+
ms.date: 09/13/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -19,7 +19,7 @@ ms.collection: M365-identity-device-management
1919

2020
Users often create passwords that use common local words such as a school, sports team, or famous person. These passwords are easy to guess, and weak against dictionary-based attacks. To enforce strong passwords in your organization, Azure Active Directory (Azure AD) Password Protection provides a global and custom banned password list. A password change request fails if there's a match in these banned password list.
2121

22-
To protect your on-premises Active Directory Domain Services (AD DS) environment, you can install and configure Azure AD Password Protection to work with your on-prem DC. This article shows you how to enable Azure AD Password Protection for your on-premises environment.
22+
To protect your on-premises Active Directory Domain Services (AD DS) environment, you can install and configure Azure AD Password Protection to work with your on-premises DC. This article shows you how to enable Azure AD Password Protection for your on-premises environment.
2323

2424
For more information on how Azure AD Password Protection works in an on-premises environment, see [How to enforce Azure AD Password Protection for Windows Server Active Directory](concept-password-ban-bad-on-premises.md).
2525

@@ -31,15 +31,16 @@ This article shows you how to enable Azure AD Password Protection for your on-pr
3131

3232
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
3333

34-
1. Sign in to the [Azure portal](https://portal.azure.com) and browse to **Azure Active Directory** > **Security** > **Authentication methods** > **Password protection**.
34+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Administrator](../roles/permissions-reference.md#authentication-administrator).
35+
1. Browse to **Protection** > **Authentication methods** > **Password protection**.
3536
1. Set the option for **Enable password protection on Windows Server Active Directory** to *Yes*.
3637

3738
When this setting is set to *No*, all deployed Azure AD Password Protection DC agents go into a quiescent mode where all passwords are accepted as-is. No validation activities are performed, and audit events aren't generated.
3839

3940
1. It's recommended to initially set the **Mode** to *Audit*. After you're comfortable with the feature and the impact on users in your organization, you can switch the **Mode** to *Enforced*. For more information, see the following section on [modes of operation](#modes-of-operation).
4041
1. When ready, select **Save**.
4142

42-
[![Enable on-premises password protection under Authentication Methods in the Azure portal](media/howto-password-ban-bad-on-premises-operations/enable-configure-custom-banned-passwords-cropped.png)](media/howto-password-ban-bad-on-premises-operations/enable-configure-custom-banned-passwords.png#lightbox)
43+
[![Enable on-premises password protection under Authentication Methods in the Microsoft Entra admin center](media/howto-password-ban-bad-on-premises-operations/enable-configure-custom-banned-passwords-cropped.png)](media/howto-password-ban-bad-on-premises-operations/enable-configure-custom-banned-passwords.png#lightbox)
4344

4445
## Modes of operation
4546

@@ -70,4 +71,4 @@ Affected end users may need to work with their IT staff to understand the new re
7071

7172
To customize the banned password list for your organization, see [Configure the Azure AD Password Protection custom banned password list](tutorial-configure-custom-password-protection.md).
7273

73-
To monitor on-prem events, see [Monitoring on-prem Azure AD Password Protection](howto-password-ban-bad-on-premises-monitor.md).
74+
To monitor on-premises events, see [Monitoring on-premises Azure AD Password Protection](howto-password-ban-bad-on-premises-monitor.md).

articles/active-directory/authentication/howto-password-smart-lockout.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 01/29/2023
9+
ms.date: 09/23/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -66,8 +66,8 @@ Based on your organizational requirements, you can customize the Azure AD smart
6666

6767
To check or modify the smart lockout values for your organization, complete the following steps:
6868

69-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com/#home).
70-
1. Search for and select *Azure Active Directory*, then select **Security** > **Authentication methods** > **Password protection**.
69+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Administrator](../roles/permissions-reference.md#authentication-administrator).
70+
1. Browse to **Protection** > **Authentication methods** > **Password protection**.
7171
1. Set the **Lockout threshold**, based on how many failed sign-ins are allowed on an account before its first lockout.
7272

7373
The default is 10 for Azure Public tenants and 3 for Azure US Government tenants.
@@ -79,7 +79,7 @@ To check or modify the smart lockout values for your organization, complete the
7979
> [!NOTE]
8080
> If the first sign-in after a lockout period has expired also fails, the account locks out again. If an account locks repeatedly, the lockout duration increases.
8181
82-
![Customize the Azure AD smart lockout policy in the Azure portal](./media/howto-password-smart-lockout/azure-active-directory-custom-smart-lockout-policy.png)
82+
![Customize the Azure AD smart lockout policy in the Microsoft Entra admin center](./media/howto-password-smart-lockout/azure-active-directory-custom-smart-lockout-policy.png)
8383

8484
## Testing Smart lockout
8585

0 commit comments

Comments
 (0)