Skip to content

Commit 9644b97

Browse files
authored
Merge pull request #215982 from Justinha/context-ga-2
added link to Alex blog
2 parents d0606a5 + ae3d494 commit 9644b97

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

articles/active-directory/authentication/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@
5656
items:
5757
- name: How MFA works
5858
href: concept-mfa-howitworks.md
59-
- name: Default enablement
59+
- name: Default protection
6060
href: concept-authentication-default-enablement.md
6161
- name: Prompts and session lifetime
6262
href: concepts-azure-multi-factor-authentication-prompts-session-lifetime.md

articles/active-directory/authentication/concept-authentication-default-enablement.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 10/19/2022
9+
ms.date: 10/26/2022
1010

1111
ms.author: justinha
1212
author: mjsantani
@@ -20,7 +20,7 @@ ms.collection: M365-identity-device-management
2020

2121
Azure Active Directory (Azure AD) adds and improves security features to better protect customers against increasing attacks. As new attack vectors become known, Azure AD may respond by enabling protection by default to help customers stay ahead of emerging security threats.
2222

23-
For example, in response to increasing MFA fatigue attacks, Microsoft recommended ways for customers to [defend users](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/defend-your-users-from-mfa-fatigue-attacks/ba-p/2365677). One recommendation to prevent users from accidental multifactor authentication (MFA) approvals is to enable [number matching](how-to-mfa-number-match.md). As a result, default behavior for number matching will be explicitly **Enabled** for all Microsoft Authenticator users.
23+
For example, in response to increasing MFA fatigue attacks, Microsoft recommended ways for customers to [defend users](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/defend-your-users-from-mfa-fatigue-attacks/ba-p/2365677). One recommendation to prevent users from accidental multifactor authentication (MFA) approvals is to enable [number matching](how-to-mfa-number-match.md). As a result, default behavior for number matching will be explicitly **Enabled** for all Microsoft Authenticator users. You can learn more about new security features like number matching in our blog post [Advanced Microsoft Authenticator security features are now generally available!](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/advanced-microsoft-authenticator-security-features-are-now/ba-p/2365673).
2424

2525
There are two ways for protection of a security feature to be enabled by default:
2626

0 commit comments

Comments
 (0)