Skip to content

Commit 89c7735

Browse files
authored
Merge pull request #108651 from Sammak/patch-15
Update for MSRC case - admins sign in
2 parents 940633a + fae1a64 commit 89c7735

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

articles/active-directory/fundamentals/concept-fundamentals-security-defaults.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,9 @@ All users in your tenant must register for multifactor authentication (MFA) in t
6565
Administrators have increased access to your environment. Because of the power these highly privileged accounts have, you should treat them with special care. One common method to improve the protection of privileged accounts is to require a stronger form of account verification for sign-in. In Azure AD, you can get a stronger account verification by requiring multifactor authentication.
6666

6767
> [!TIP]
68-
> We recommend having separate accounts for administration and standard productivity tasks to significantly reduce the number of times your admins are prompted for MFA.
68+
> Recommendations for your admins:
69+
> - Ensure all your admins sign in after enabling security defaults so that they can register for authentication methods.
70+
> - Have separate accounts for administration and standard productivity tasks to significantly reduce the number of times your admins are prompted for MFA.
6971
7072
After registration with Azure AD Multifactor Authentication is finished, the following Azure AD administrator roles will be required to do extra authentication every time they sign in:
7173

0 commit comments

Comments
 (0)