Skip to content

Commit 80b4848

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents df24e75 + 2aa52d3 commit 80b4848

File tree

243 files changed

+2415
-2228
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

243 files changed

+2415
-2228
lines changed

.openpublishing.redirection.json

Lines changed: 18 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -24022,7 +24022,12 @@
2402224022
},
2402324023
{
2402424024
"source_path_from_root": "/articles/key-vault/key-vault-best-practices.md",
24025-
"redirect_url": "/azure/key-vault/general/best-practices",
24025+
"redirect_url": "/azure/key-vault/general/security-overview",
24026+
"redirect_document_id": false
24027+
},
24028+
{
24029+
"source_path_from_root": "/articles/key-vault/general/best-practices.md",
24030+
"redirect_url": "/azure/key-vault/general/security-overview",
2402624031
"redirect_document_id": false
2402724032
},
2402824033
{
@@ -24117,7 +24122,12 @@
2411724122
},
2411824123
{
2411924124
"source_path_from_root": "/articles/key-vault/overview-security.md",
24120-
"redirect_url": "/azure/key-vault/general/overview-security",
24125+
"redirect_url": "/azure/key-vault/general/security-overview",
24126+
"redirect_document_id": false
24127+
},
24128+
{
24129+
"source_path_from_root": "/articles/key-vault/general/overview-security.md",
24130+
"redirect_url": "/azure/key-vault/general/security-overview",
2412124131
"redirect_document_id": false
2412224132
},
2412324133
{
@@ -24167,7 +24177,12 @@
2416724177
},
2416824178
{
2416924179
"source_path_from_root": "/articles/key-vault/security-recommendations.md",
24170-
"redirect_url": "/azure/key-vault/general/security-recommendations",
24180+
"redirect_url": "/azure/key-vault/general/security-overview",
24181+
"redirect_document_id": false
24182+
},
24183+
{
24184+
"source_path_from_root": "/articles/key-vault/general/security-recommendations.md",
24185+
"redirect_url": "/azure/key-vault/general/security-overview",
2417124186
"redirect_document_id": false
2417224187
},
2417324188
{

CODEOWNERS

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,10 @@ articles/governance/ @DCtheGeek
3838
articles/**/*security-baseline.md @msmbaldwin @mgblythe
3939
articles/security/benchmarks/ @msmbaldwin @mgblythe
4040

41+
# DDOS Protection
42+
43+
articles/ddos-protection @aletheatoh @anupamvi
44+
4145
# Configuration
4246
*.json @SyntaxC4 @snoviking @martinekuan
4347
.acrolinx-config.edn @MonicaRush @martinekuan

articles/active-directory/authentication/concept-resilient-controls.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -32,8 +32,8 @@ This document provides guidance on strategies an organization should adopt to pr
3232
There are four key takeaways in this document:
3333

3434
* Avoid administrator lockout by using emergency access accounts.
35-
* Implement MFA using Conditional Access (CA) rather than per-user MFA.
36-
* Mitigate user lockout by using multiple Conditional Access (CA) controls.
35+
* Implement MFA using Conditional Access rather than per-user MFA.
36+
* Mitigate user lockout by using multiple Conditional Access controls.
3737
* Mitigate user lockout by provisioning multiple authentication methods or equivalents for each user.
3838

3939
## Before a disruption
@@ -132,9 +132,9 @@ This naming standard for the contingency policies will be as follows:
132132
EMnnn - ENABLE IN EMERGENCY: [Disruption][i/n] - [Apps] - [Controls] [Conditions]
133133
```
134134

135-
The following example: **Example A - Contingency CA policy to restore Access to mission-critical Collaboration Apps**, is a typical corporate contingency. In this scenario, the organization typically requires MFA for all Exchange Online and SharePoint Online access, and the disruption in this case is the MFA provider for the customer has an outage (whether Azure AD MFA, on-premises MFA provider, or third-party MFA). This policy mitigates this outage by allowing specific targeted users access to these apps from trusted Windows devices only when they are accessing the app from their trusted corporate network. It will also exclude emergency accounts and core administrators from these restrictions. The targeted users will then gain access to Exchange Online and SharePoint Online, while other users will still not have access to the apps due to the outage. This example will require a named network location **CorpNetwork** and a security group **ContingencyAccess** with the target users, a group named **CoreAdmins** with the core administrators, and a group named **EmergencyAccess** with the emergency access accounts. The contingency requires four policies to provide the desired access.
135+
The following example: **Example A - Contingency Conditional Access policy to restore Access to mission-critical Collaboration Apps**, is a typical corporate contingency. In this scenario, the organization typically requires MFA for all Exchange Online and SharePoint Online access, and the disruption in this case is the MFA provider for the customer has an outage (whether Azure AD MFA, on-premises MFA provider, or third-party MFA). This policy mitigates this outage by allowing specific targeted users access to these apps from trusted Windows devices only when they are accessing the app from their trusted corporate network. It will also exclude emergency accounts and core administrators from these restrictions. The targeted users will then gain access to Exchange Online and SharePoint Online, while other users will still not have access to the apps due to the outage. This example will require a named network location **CorpNetwork** and a security group **ContingencyAccess** with the target users, a group named **CoreAdmins** with the core administrators, and a group named **EmergencyAccess** with the emergency access accounts. The contingency requires four policies to provide the desired access.
136136

137-
**Example A - Contingency CA policies to restore Access to mission-critical Collaboration Apps:**
137+
**Example A - Contingency Conditional Access policies to restore Access to mission-critical Collaboration Apps:**
138138

139139
* Policy 1: Require Domain Joined devices for Exchange and SharePoint
140140
* Name: EM001 - ENABLE IN EMERGENCY: MFA Disruption[1/4] - Exchange SharePoint - Require Hybrid Azure AD Join
@@ -174,9 +174,9 @@ Order of activation:
174174
5. Enable Policy 4: Verify all users cannot get Exchange Online from the native mail applications on mobile devices.
175175
6. Disable the existing MFA policy for SharePoint Online and Exchange Online.
176176

177-
In this next example, **Example B - Contingency CA policies to allow mobile access to Salesforce**, a business app’s access is restored. In this scenario, the customer typically requires their sales employees access to Salesforce (configured for single-sign on with Azure AD) from mobile devices to only be allowed from compliant devices. The disruption in this case is that there is an issue with evaluating device compliance and the outage is happening at a sensitive time where the sales team needs access to Salesforce to close deals. These contingency policies will grant critical users access to Salesforce from a mobile device so that they can continue to close deals and not disrupt the business. In this example, **SalesforceContingency** contains all the Sales employees who need to retain access and **SalesAdmins** contains necessary admins of Salesforce.
177+
In this next example, **Example B - Contingency Conditional Access policies to allow mobile access to Salesforce**, a business app’s access is restored. In this scenario, the customer typically requires their sales employees access to Salesforce (configured for single-sign on with Azure AD) from mobile devices to only be allowed from compliant devices. The disruption in this case is that there is an issue with evaluating device compliance and the outage is happening at a sensitive time where the sales team needs access to Salesforce to close deals. These contingency policies will grant critical users access to Salesforce from a mobile device so that they can continue to close deals and not disrupt the business. In this example, **SalesforceContingency** contains all the Sales employees who need to retain access and **SalesAdmins** contains necessary admins of Salesforce.
178178

179-
**Example B - Contingency CA policies:**
179+
**Example B - Contingency Conditional Access policies:**
180180

181181
* Policy 1: Block everyone not in the SalesContingency team
182182
* Name: EM001 - ENABLE IN EMERGENCY: Device Compliance Disruption[1/2] - Salesforce - Block All users except SalesforceContingency

articles/active-directory/conditional-access/concept-conditional-access-report-only.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Report-only mode is a new Conditional Access policy state that allows administra
2727
- Customers with an Azure Monitor subscription can monitor the impact of their Conditional Access policies using the Conditional Access insights workbook.
2828

2929
> [!WARNING]
30-
> Policies in report-only mode that require compliant devices may prompt users on Mac, iOS, and Android to select a device certificate during policy evaluation, even though device compliance is not enforced. These prompts may repeat until the device is made compliant. To prevent end users from receiving prompts during sign-in, exclude device platforms Mac, iOS and Android from report-only policies that perform device compliance checks. Note that report-only mode is not applicable for CA policies with "User Actions" scope.
30+
> Policies in report-only mode that require compliant devices may prompt users on Mac, iOS, and Android to select a device certificate during policy evaluation, even though device compliance is not enforced. These prompts may repeat until the device is made compliant. To prevent end users from receiving prompts during sign-in, exclude device platforms Mac, iOS and Android from report-only policies that perform device compliance checks. Note that report-only mode is not applicable for Conditional Access policies with "User Actions" scope.
3131
3232
![Report-only tab in Azure AD sign-in log](./media/concept-conditional-access-report-only/report-only-detail-in-sign-in-log.png)
3333

articles/active-directory/conditional-access/howto-conditional-access-policy-registration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ Some may choose to use device state instead of location in step 6 above:
5858

5959
> [!WARNING]
6060
> If you use device state as a condition in your policy this may impact guest users in the directory. [Report-only mode](concept-conditional-access-report-only.md) can help determine the impact of policy decisions.
61-
> Note that report-only mode is not applicable for CA policies with "User Actions" scope.
61+
> Note that report-only mode is not applicable for Conditional Access policies with "User Actions" scope.
6262
6363
## Next steps
6464

0 commit comments

Comments
 (0)