Skip to content

Commit 7dc9676

Browse files
update
1 parent 2d93d66 commit 7dc9676

File tree

1 file changed

+37
-35
lines changed

1 file changed

+37
-35
lines changed

articles/active-directory/fundamentals/concept-fundamentals-security-defaults.md

Lines changed: 37 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -54,37 +54,6 @@ To enable security defaults in your directory:
5454

5555
![Screenshot of the Azure portal with the toggle to enable security defaults](./media/concept-fundamentals-security-defaults/security-defaults-azure-ad-portal.png)
5656

57-
## Backup administrator accounts
58-
59-
Every organization should have at least two backup administrator accounts configured. We call these emergency access accounts.
60-
61-
These accounts may be used in scenarios where your normal administrator accounts can't be used. For example: The person with the most recent Global Administrator access has left the organization. Azure AD prevents the last Global Administrator account from being deleted, but it doesn't prevent the account from being deleted or disabled on-premises. Either situation might make the organization unable to recover the account.
62-
63-
Emergency access accounts are:
64-
65-
- Assigned Global Administrator rights in Azure AD.
66-
- Aren't used on a daily basis.
67-
- Are protected with a long complex password.
68-
69-
The credentials for these emergency access accounts should be stored offline in a secure location such as a fireproof safe. Only authorized individuals should have access to these credentials.
70-
71-
To create an emergency access account:
72-
73-
1. Sign in to the **Azure portal** as an existing Global Administrator.
74-
1. Browse to **Azure Active Directory** > **Users**.
75-
1. Select **New user**.
76-
1. Select **Create user**.
77-
1. Give the account a **User name**.
78-
1. Give the account a **Name**.
79-
1. Create a long and complex password for the account.
80-
1. Under **Roles**, assign the **Global Administrator** role.
81-
1. Under **Usage location**, select the appropriate location.
82-
1. Select **Create**.
83-
84-
You may choose to [disable password expiration](../authentication/concept-sspr-policy.md#set-a-password-to-never-expire) for these accounts using Azure AD PowerShell.
85-
86-
For more detailed information about emergency access accounts, see the article [Manage emergency access accounts in Azure AD](../roles/security-emergency-access.md).
87-
8857
## Policies enforced
8958

9059
### Require all users to register for Azure AD Multi-Factor Authentication
@@ -161,7 +130,9 @@ This policy applies to all users who are accessing Azure Resource Manager servic
161130
> [!NOTE]
162131
> The Azure AD Connect synchronization account is excluded from security defaults and will not be prompted to register for or perform multi-factor authentication. Organizations should not be using this account for other purposes.
163132
164-
## Authentication methods
133+
## Deployment considerations
134+
135+
### Authentication methods
165136

166137
Security defaults allow registration and use of Azure AD Multi-Factor Authentication **using only the Microsoft Authenticator app using notifications**. Conditional Access allows the use of any authentication method the administrator chooses to enable.
167138

@@ -179,11 +150,42 @@ Security defaults allow registration and use of Azure AD Multi-Factor Authentica
179150
> [!WARNING]
180151
> Do not disable methods for your organization if you are using Security Defaults. Disabling methods may lead to locking yourself out of your tenant. Leave all **Methods available to users** enabled in the [MFA service settings portal](../authentication/howto-mfa-getstarted.md#choose-authentication-methods-for-mfa).
181152
182-
## Disabled MFA status
153+
### Backup administrator accounts
154+
155+
Every organization should have at least two backup administrator accounts configured. We call these emergency access accounts.
156+
157+
These accounts may be used in scenarios where your normal administrator accounts can't be used. For example: The person with the most recent Global Administrator access has left the organization. Azure AD prevents the last Global Administrator account from being deleted, but it doesn't prevent the account from being deleted or disabled on-premises. Either situation might make the organization unable to recover the account.
158+
159+
Emergency access accounts are:
160+
161+
- Assigned Global Administrator rights in Azure AD.
162+
- Aren't used on a daily basis.
163+
- Are protected with a long complex password.
164+
165+
The credentials for these emergency access accounts should be stored offline in a secure location such as a fireproof safe. Only authorized individuals should have access to these credentials.
166+
167+
To create an emergency access account:
168+
169+
1. Sign in to the **Azure portal** as an existing Global Administrator.
170+
1. Browse to **Azure Active Directory** > **Users**.
171+
1. Select **New user**.
172+
1. Select **Create user**.
173+
1. Give the account a **User name**.
174+
1. Give the account a **Name**.
175+
1. Create a long and complex password for the account.
176+
1. Under **Roles**, assign the **Global Administrator** role.
177+
1. Under **Usage location**, select the appropriate location.
178+
1. Select **Create**.
179+
180+
You may choose to [disable password expiration](../authentication/concept-sspr-policy.md#set-a-password-to-never-expire) for these accounts using Azure AD PowerShell.
181+
182+
For more detailed information about emergency access accounts, see the article [Manage emergency access accounts in Azure AD](../roles/security-emergency-access.md).
183+
184+
### Disabled MFA status
183185

184186
If your organization is a previous user of per-user based Azure AD Multi-Factor Authentication, don't be alarmed to not see users in an **Enabled** or **Enforced** status if you look at the Multi-Factor Auth status page. **Disabled** is the appropriate status for users who are using security defaults or Conditional Access based Azure AD Multi-Factor Authentication.
185187

186-
## Conditional Access
188+
### Conditional Access
187189

188190
You can use Conditional Access to configure policies similar to security defaults, but with more granularity including user exclusions, which aren't available in security defaults. If you're using Conditional Access in your environment today, security defaults won't be available to you.
189191

@@ -196,7 +198,7 @@ If you want to enable Conditional Access to configure a set of policies, which f
196198
- [Block legacy authentication](../conditional-access/howto-conditional-access-policy-block-legacy.md)
197199
- [Require MFA for all users](../conditional-access/howto-conditional-access-policy-all-users-mfa.md)
198200

199-
## Disabling security defaults
201+
### Disabling security defaults
200202

201203
Organizations that choose to implement Conditional Access policies that replace security defaults must disable security defaults.
202204

0 commit comments

Comments
 (0)