Skip to content

Commit 9466ae4

Browse files
Update mfa-enforcement.md
1 parent eb8bb21 commit 9466ae4

File tree

1 file changed

+20
-18
lines changed

1 file changed

+20
-18
lines changed

articles/governance/policy/tutorials/mfa-enforcement.md

Lines changed: 20 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ This guide walks you through the process of applying Azure Policy assignments to
1212

1313
## Apply Azure Policy enforcement through Azure Portal
1414

15-
### 1. Sign In to Azure Portal
15+
### 1. Sign into Azure portal
1616
Navigate to the [Azure portal](https://www.portal.azure.com)
1717

1818
### 2. Access Azure Policy Service
@@ -21,28 +21,30 @@ Select Policy under Azure services. If you don't see it, type 'Policy' in the se
2121
:::image type="content" source="../media/multifactor-enforcement/policy-assignment-view.png" alt-text="Screenshot of Azure Policy Assignment View." border="false":::
2222

2323
### 3. Choose the Scope for Assignment
24-
- In the Policy dashboard, click on Assignments in the left pane.
25-
- Click Assign policy at the top of the assignments page.
26-
- In the Scope section, click Select scope.
27-
- Choose the appropriate resource group, subscription, or management group where you want to apply the policy. Click Select to confirm your choice.
24+
- Click 'Assignments' in the left pane of the Policy dashboard, .
25+
- Click 'Assign policy' at the top of the assignments page.
26+
- Click 'Select scope' in the Scope section,.
27+
- Select the appropriate resource group, subscription, or management group where you want to apply the policy
28+
- Click Select to confirm your choice.
2829

2930
### 4. Configure Selectors for gradual rollout of policy enforcement
3031
> [!NOTE]
3132
> To enable safe rollout of policy enforcement, we recommend using Azure Policy’s resource selectors to gradually rollout policy enforcement across your resources.
32-
- In the 'Basics' tab, you see 'Resource Selectors'. Click expand.
33-
- Click 'Add a resource selector'
33+
- Click 'expand' on the 'Resource Selectors' section of the Basics tab.
34+
- Click 'Add a resource selector'
3435
:::image type="content" source="../media/multifactor-enforcement/policy-resource-selectors.png" alt-text="Screenshot of Azure Policy Assignment Creation View." border="false":::
35-
- In your resource selector, add a name for your selector.
36-
- Toggle resourceLocation to enable it. Pick a few low-risk regions that you’d like to enforce on. The policy assignment evaluates Azure resources in those regions.
36+
- Add a name for your selector
37+
- Toggle resourceLocation to enable it.
38+
- Pick a few low-risk regions that you’d like to enforce on. The policy assignment evaluates Azure resources in those regions.
3739
- You can update this assignment later to add more regions by adding more resourceLocation selectors or updating the existing resourceLocation selector to add more regions.
3840

3941
:::image type="content" source="../media/multifactor-enforcement/resource-selector-creation.png" alt-text="Screenshot of Azure Policy Selector Creation View." border="false":::
4042

4143
### 5. Select a Policy Definition
42-
- Under 'Basics', click on Policy definition.
44+
- Click on Policy definition under 'Basics'.
4345
- Browse or search for the multifactor policy definition – there are 2 of them. Pick one for now:
44-
- [[Preview]: Users must authenticate with multifactor authentication to delete resources - Microsoft Azure](https://ms.portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetail.ReactView/id/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2Fdb4a9d17-db75-4f46-9fcb-9f9526604417/version/1.0.0-preview/scopes/%5B%22%2Fsubscriptions%2F12015272-f077-4945-81de-a5f607d067e1%22%2C%22%2Fsubscriptions%2F0ba674a6-9fde-43b4-8370-a7e16fdf0641%22%5D/contextRender/)
45-
- [[Preview]: Users must authenticate with multifactor authentication to create or update resources - Microsoft Azure](https://ms.portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetail.ReactView/id/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F4e6c27d5-a6ee-49cf-b2b4-d8fe90fa2b8b/version/1.0.0-preview/scopes/%5B%22%2Fsubscriptions%2F12015272-f077-4945-81de-a5f607d067e1%22%2C%22%2Fsubscriptions%2F0ba674a6-9fde-43b4-8370-a7e16fdf0641%22%5D/contextRender/)
46+
- [[Preview]: Users must authenticate with multifactor authentication to delete resources - Microsoft Azure](https://portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetail.ReactView/id/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2Fdb4a9d17-db75-4f46-9fcb-9f9526604417/version/1.0.0-preview/scopes/%5B%22%2Fsubscriptions%2F12015272-f077-4945-81de-a5f607d067e1%22%2C%22%2Fsubscriptions%2F0ba674a6-9fde-43b4-8370-a7e16fdf0641%22%5D/contextRender/)
47+
- [[Preview]: Users must authenticate with multifactor authentication to create or update resources - Microsoft Azure](https://portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetail.ReactView/id/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F4e6c27d5-a6ee-49cf-b2b4-d8fe90fa2b8b/version/1.0.0-preview/scopes/%5B%22%2Fsubscriptions%2F12015272-f077-4945-81de-a5f607d067e1%22%2C%22%2Fsubscriptions%2F0ba674a6-9fde-43b4-8370-a7e16fdf0641%22%5D/contextRender/)
4648
- Select the policy definition from the list.
4749

4850
:::image type="content" source="../media/multifactor-enforcement/policy-definition-selection.png" alt-text="Screenshot of Azure Policy Definition Search View." border="false":::
@@ -51,7 +53,7 @@ Select Policy under Azure services. If you don't see it, type 'Policy' in the se
5153
- Under 'Basics', enter a Name for your policy assignment. Optionally, you may add a Description to help others understand the purpose of this assignment.
5254
- Under 'Basics', enforcement mode should be set to enabled (this mode is set by default, no action needed).
5355
- Go to the 'Parameters' tab. Uncheck 'only show parameters that require input or review'. The parameter value should be at the preselected value 'AuditAction' or 'Audit' (depending on the definition chosen in step 4).
54-
- Under the 'Non compliance messages' tab, configure a custom message that any user sees if they're blocked from deleting a resource because of this enforcement:
56+
- Under the 'Non-compliance messages' tab, configure a custom message that any user sees if they're blocked from deleting a resource because of this enforcement:
5557

5658
_Sample Text: To resolve this error, set up MFA at aka.ms/setupMFA. If you set up MFA and are still receiving this error, reach out to your Entra administrator to restore your Azure security default._
5759

@@ -62,7 +64,7 @@ _Sample Text: To resolve this error, set up MFA at aka.ms/setupMFA. If you set u
6264
- Review your selections and settings on the 'Review + create' tab.
6365
- If everything looks correct, click 'Create' to apply the policy assignment.
6466

65-
### 8. Rollout the policy assignment to all regions
67+
### 8. Roll out the policy assignment to all regions
6668
- Update the policy assignment selector to evaluate resources in other regions. Repeat this step until the policy assignment is evaluating resources in all regions.
6769

6870
### 9. Verify existence of the policy assignment
@@ -87,7 +89,7 @@ You can set enforcement by updating the 'Effect' of the policy assignment.
8789
## Audit Mode
8890
Discover audit events in your activity log when this policy assignment is applied in audit mode and they attempt to create, update, or delete a resource without authenticating with MFA.
8991

90-
You can view activity Log events in Azure portal and other supported SDKs. Here's a sample query that can be used in CLI:
92+
You can view activity Log events in Azure portal and other supported clients. Here's a sample query that can be used in CLI:
9193

9294
`az monitor activity-log list \
9395
  --query "[?operationName.value=='Microsoft.Authorization/policies/audit/action'].{ResourceId: resourceId, Policies: properties.policies}" \
@@ -104,7 +106,7 @@ The next section shows the experience from some select clients when the policy a
104106
### Azure Portal
105107
When you attempt to perform a create, update, or delete operation without an MFA-authenticated token, Azure portal may return:
106108

107-
:::image type="content" source="../media/multifactor-enforcement/portal-enforcement-sample.png" alt-text="Screenshot of Azure portal View When User Gets Blocked By Policy." border="false":::
109+
:::image type="content" source="../media/multifactor-enforcement/portal-enforcement-sample.png" alt-text="Screenshot of Azure portal view." border="false":::
108110

109111
### Azure CLI
110112
When you attempt to perform a create, update, or delete operation without an MFA-authenticated token, Azure CLI may return:
@@ -114,8 +116,8 @@ When you attempt to perform a create, update, or delete operation without an MFA
114116
### Azure PowerShell
115117
When you attempt to perform a create, update, or delete operation without an MFA-authenticated token, Azure PowerShell may return:
116118

117-
:::image type="content" source="../media/multifactor-enforcement/powershell-sample.png" alt-text="Screenshot of Azure PS View When User Gets Blocked By Policy." border="false":::
119+
:::image type="content" source="../media/multifactor-enforcement/powershell-sample.png" alt-text="Screenshot of Azure PowerShell View When User Gets Blocked By Policy." border="false":::
118120

119121
## Limitations in the Preview Timeframe
120-
- In some cases, you may not be prompted to complete MFA after receiving an error. In such cases, re-authenticate with MFA before retrying the operation (for example, through Azure portal).
122+
- In some cases, you may not be prompted to complete MFA after receiving an error. In such cases, reauthenticate with MFA before retrying the operation (for example, through Azure portal).
121123
- In some cases, the error message may not indicate that the operation is blocked due to the policy assignment in-place. Take note of the error message samples to familiarize your organization on what error messages they may receive.

0 commit comments

Comments
 (0)