Skip to content

Commit 92fda79

Browse files
author
ajburnle
committed
fixed links
1 parent 0066556 commit 92fda79

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/active-directory/fundamentals/active-directory-ops-guide-auth.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -129,7 +129,7 @@ If you have domain-joined Windows devices that aren't registered in the cloud, o
129129

130130
![A screenshot of grant in conditional access policy requiring hybrid device](./media/active-directory-ops-guide/active-directory-ops-img6.png)
131131

132-
If you are managing devices with MDM or Microsoft Intune, but not using device controls in your conditional access policies, then we recommend using [Require device to be marked as compliant](../conditional-access/require-managed-devices#require-device-to-be-marked-as-compliant.md) as a control in those policies.
132+
If you are managing devices with MDM or Microsoft Intune, but not using device controls in your conditional access policies, then we recommend using [Require device to be marked as compliant](../conditional-access/require-managed-devices.md#require-device-to-be-marked-as-compliant) as a control in those policies.
133133

134134
![A screenshot of grant in conditional access policy requiring device compliance](./media/active-directory-ops-guide/active-directory-ops-img7.png)
135135

@@ -243,7 +243,7 @@ Conditional Access is an essential tool for improving the security posture of yo
243243
- Use Conditional Access policies to [implement MFA](../conditional-access/plan-conditional-access.md), rather than using a **per-user MFA**
244244
- Have a small set of core policies that can apply to multiple applications
245245
- Define empty exception groups and add them to the policies to have an exception strategy
246-
- Plan for [break glass](../users-groups-roles/directory-admin-roles-secure#break-glass-what-to-do-in-an-emergency.md) accounts without MFA controls
246+
- Plan for [break glass](../users-groups-roles/directory-admin-roles-secure.md#break-glass-what-to-do-in-an-emergency) accounts without MFA controls
247247
- Ensure a consistent experience across Office 365 client applications, for example, Teams, OneDrive for Business, Outlook, etc.) by implementing the same set of controls for services such as Exchange Online and Sharepoint Online
248248
- Assignment to policies should be implemented through groups, not individuals
249249
- Do regular reviews of the exception groups used in policies to limit the time users are out of the security posture. If you own Azure AD P2, then you can use access reviews to automate the process

0 commit comments

Comments
 (0)