You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/concept-fundamentals-security-defaults.md
+37-35Lines changed: 37 additions & 35 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -54,37 +54,6 @@ To enable security defaults in your directory:
54
54
55
55

56
56
57
-
## Backup administrator accounts
58
-
59
-
Every organization should have at least two backup administrator accounts configured. We call these emergency access accounts.
60
-
61
-
These accounts may be used in scenarios where your normal administrator accounts can't be used. For example: The person with the most recent Global Administrator access has left the organization. Azure AD prevents the last Global Administrator account from being deleted, but it doesn't prevent the account from being deleted or disabled on-premises. Either situation might make the organization unable to recover the account.
62
-
63
-
Emergency access accounts are:
64
-
65
-
- Assigned Global Administrator rights in Azure AD.
66
-
- Aren't used on a daily basis.
67
-
- Are protected with a long complex password.
68
-
69
-
The credentials for these emergency access accounts should be stored offline in a secure location such as a fireproof safe. Only authorized individuals should have access to these credentials.
70
-
71
-
To create an emergency access account:
72
-
73
-
1. Sign in to the **Azure portal** as an existing Global Administrator.
74
-
1. Browse to **Azure Active Directory** > **Users**.
75
-
1. Select **New user**.
76
-
1. Select **Create user**.
77
-
1. Give the account a **User name**.
78
-
1. Give the account a **Name**.
79
-
1. Create a long and complex password for the account.
80
-
1. Under **Roles**, assign the **Global Administrator** role.
81
-
1. Under **Usage location**, select the appropriate location.
82
-
1. Select **Create**.
83
-
84
-
You may choose to [disable password expiration](../authentication/concept-sspr-policy.md#set-a-password-to-never-expire) for these accounts using Azure AD PowerShell.
85
-
86
-
For more detailed information about emergency access accounts, see the article [Manage emergency access accounts in Azure AD](../roles/security-emergency-access.md).
87
-
88
57
## Policies enforced
89
58
90
59
### Require all users to register for Azure AD Multi-Factor Authentication
@@ -161,7 +130,9 @@ This policy applies to all users who are accessing Azure Resource Manager servic
161
130
> [!NOTE]
162
131
> The Azure AD Connect synchronization account is excluded from security defaults and will not be prompted to register for or perform multi-factor authentication. Organizations should not be using this account for other purposes.
163
132
164
-
## Authentication methods
133
+
## Deployment considerations
134
+
135
+
### Authentication methods
165
136
166
137
Security defaults allow registration and use of Azure AD Multi-Factor Authentication **using only the Microsoft Authenticator app using notifications**. Conditional Access allows the use of any authentication method the administrator chooses to enable.
167
138
@@ -179,11 +150,42 @@ Security defaults allow registration and use of Azure AD Multi-Factor Authentica
179
150
> [!WARNING]
180
151
> Do not disable methods for your organization if you are using Security Defaults. Disabling methods may lead to locking yourself out of your tenant. Leave all **Methods available to users** enabled in the [MFA service settings portal](../authentication/howto-mfa-getstarted.md#choose-authentication-methods-for-mfa).
181
152
182
-
## Disabled MFA status
153
+
### Backup administrator accounts
154
+
155
+
Every organization should have at least two backup administrator accounts configured. We call these emergency access accounts.
156
+
157
+
These accounts may be used in scenarios where your normal administrator accounts can't be used. For example: The person with the most recent Global Administrator access has left the organization. Azure AD prevents the last Global Administrator account from being deleted, but it doesn't prevent the account from being deleted or disabled on-premises. Either situation might make the organization unable to recover the account.
158
+
159
+
Emergency access accounts are:
160
+
161
+
- Assigned Global Administrator rights in Azure AD.
162
+
- Aren't used on a daily basis.
163
+
- Are protected with a long complex password.
164
+
165
+
The credentials for these emergency access accounts should be stored offline in a secure location such as a fireproof safe. Only authorized individuals should have access to these credentials.
166
+
167
+
To create an emergency access account:
168
+
169
+
1. Sign in to the **Azure portal** as an existing Global Administrator.
170
+
1. Browse to **Azure Active Directory** > **Users**.
171
+
1. Select **New user**.
172
+
1. Select **Create user**.
173
+
1. Give the account a **User name**.
174
+
1. Give the account a **Name**.
175
+
1. Create a long and complex password for the account.
176
+
1. Under **Roles**, assign the **Global Administrator** role.
177
+
1. Under **Usage location**, select the appropriate location.
178
+
1. Select **Create**.
179
+
180
+
You may choose to [disable password expiration](../authentication/concept-sspr-policy.md#set-a-password-to-never-expire) for these accounts using Azure AD PowerShell.
181
+
182
+
For more detailed information about emergency access accounts, see the article [Manage emergency access accounts in Azure AD](../roles/security-emergency-access.md).
183
+
184
+
### Disabled MFA status
183
185
184
186
If your organization is a previous user of per-user based Azure AD Multi-Factor Authentication, don't be alarmed to not see users in an **Enabled** or **Enforced** status if you look at the Multi-Factor Auth status page. **Disabled** is the appropriate status for users who are using security defaults or Conditional Access based Azure AD Multi-Factor Authentication.
185
187
186
-
## Conditional Access
188
+
###Conditional Access
187
189
188
190
You can use Conditional Access to configure policies similar to security defaults, but with more granularity including user exclusions, which aren't available in security defaults. If you're using Conditional Access in your environment today, security defaults won't be available to you.
189
191
@@ -196,7 +198,7 @@ If you want to enable Conditional Access to configure a set of policies, which f
0 commit comments