Skip to content

Commit 96c2888

Browse files
authored
Update whats-new-archive.md
fixes to capitalization in product name, mostly
1 parent 5896b33 commit 96c2888

File tree

1 file changed

+21
-21
lines changed

1 file changed

+21
-21
lines changed

articles/active-directory/fundamentals/whats-new-archive.md

Lines changed: 21 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ Customers can now view, restore, and permanently remove deleted app registration
8080
**Service category:** Conditional Access
8181
**Product capability:** Identity Security & Protection
8282

83-
A new user action called "Register or join devices" in Conditional access is available. This user action allows you to control Azure Active Directory Multi-factor Authentication (MFA) policies for Azure AD device registration.
83+
A new user action called "Register or join devices" in Conditional access is available. This user action allows you to control Azure Active Directory Multi-Factor Authentication (MFA) policies for Azure AD device registration.
8484

8585
Currently, this user action only allows you to enable Azure AD MFA as a control when users register or join devices to Azure AD. Other controls that are dependent on or not applicable to Azure AD device registration are disabled with this user action. [Learn more](../conditional-access/concept-conditional-access-cloud-apps.md#user-actions).
8686

@@ -849,7 +849,7 @@ Tenant administrators can now use Staged Rollout to deploy Email Sign-In with Pr
849849
**Service category:** Reporting
850850
**Product capability:** Monitoring & Reporting
851851

852-
With the initial preview release of the Sign-in Diagnostic, admins can now review user sign-ins. Admins can receive contextual, specific, and relevant details and guidance on what happened during a sign-in and how to fix problems. The diagnostic is available in both the Azure AD level, and Conditional Access Diagnose and Solve blades. The diagnostic scenarios covered in this release are Conditional Access, Azure Active Directory Multi-factor Authentication, and successful sign-in.
852+
With the initial preview release of the Sign-in Diagnostic, admins can now review user sign-ins. Admins can receive contextual, specific, and relevant details and guidance on what happened during a sign-in and how to fix problems. The diagnostic is available in both the Azure AD level, and Conditional Access Diagnose and Solve blades. The diagnostic scenarios covered in this release are Conditional Access, Azure Active Directory Multi-Factor Authentication, and successful sign-in.
853853

854854
For more information, see [What is sign-in diagnostic in Azure AD?](../reports-monitoring/overview-sign-in-diagnostics.md).
855855

@@ -1119,7 +1119,7 @@ Manually created connected organizations will have a default setting of "configu
11191119

11201120
Risk-based Conditional Access and risk detection features of Identity Protection are now available in [Azure AD B2C](../..//active-directory-b2c/conditional-access-identity-protection-overview.md). With these advanced security features, customers can now:
11211121
- Leverage intelligent insights to assess risk with B2C apps and end user accounts. Detections include atypical travel, anonymous IP addresses, malware-linked IP addresses, and Azure AD threat intelligence. Portal and API-based reports are also available.
1122-
- Automatically address risks by configuring adaptive authentication policies for B2C users. App developers and administrators can mitigate real-time risk by requiring Azure Active Directory Multi-factor Authentication (MFA) or blocking access depending on the user risk level detected, with additional controls available based on location, group, and app.
1122+
- Automatically address risks by configuring adaptive authentication policies for B2C users. App developers and administrators can mitigate real-time risk by requiring Azure Active Directory Multi-Factor Authentication (MFA) or blocking access depending on the user risk level detected, with additional controls available based on location, group, and app.
11231123
- Integrate with Azure AD B2C user flows and custom policies. Conditions can be triggered from built-in user flows in Azure AD B2C or can be incorporated into B2C custom policies. As with other aspects of the B2C user flow, end user experience messaging can be customized. Customization is according to the organization’s voice, brand, and mitigation alternatives.
11241124

11251125
---
@@ -1189,14 +1189,14 @@ MSAL.js version 2.x now includes support for the authorization code flow for sin
11891189

11901190
---
11911191

1192-
### Updates to Remember Azure Active Directory Multi-factor Authentication (MFA) on a trusted device setting
1192+
### Updates to Remember Azure Active Directory Multi-Factor Authentication (MFA) on a trusted device setting
11931193

11941194
**Type:** Changed feature
11951195
**Service category:** MFA
11961196
**Product capability:** Identity Security & Protection
11971197

11981198

1199-
We've recently updated the [remember Azure Active Directory Multi-factor Authentication (MFA)](../authentication/howto-mfa-mfasettings.md#remember-multi-factor-authentication) on a trusted device feature to extend authentication for up to 365 days. Azure Active Directory (Azure AD) Premium licenses, can also use the [Conditional Access – Sign-in Frequency policy](../conditional-access/howto-conditional-access-session-lifetime.md#user-sign-in-frequency) that provides more flexibility for reauthentication settings.
1199+
We've recently updated the [remember Azure Active Directory Multi-Factor Authentication (MFA)](../authentication/howto-mfa-mfasettings.md#remember-multi-factor-authentication) on a trusted device feature to extend authentication for up to 365 days. Azure Active Directory (Azure AD) Premium licenses, can also use the [Conditional Access – Sign-in Frequency policy](../conditional-access/howto-conditional-access-session-lifetime.md#user-sign-in-frequency) that provides more flexibility for reauthentication settings.
12001200

12011201
For the optimal user experience, we recommend using Conditional Access sign-in frequency to extend session lifetimes on trusted devices, locations, or low-risk sessions as an alternative to remember multi-factor authentication (MFA) on a trusted device setting. To get started, review our [latest guidance on optimizing the reauthentication experience](../authentication/concepts-azure-multi-factor-authentication-prompts-session-lifetime.md).
12021202

@@ -1385,15 +1385,15 @@ This experience will be changed to display only the resources currently added in
13851385

13861386
## August 2020
13871387

1388-
### Updates to Azure Active Directory Multi-factor Authentication Server firewall requirements
1388+
### Updates to Azure Active Directory Multi-Factor Authentication Server firewall requirements
13891389

13901390
**Type:** Plan for change
13911391
**Service category:** MFA
13921392
**Product capability:** Identity Security & Protection
13931393

13941394
Starting 1 October 2020, Azure AD Multi-Factor Authentication (MFA) Server firewall requirements will require additional IP ranges.
13951395

1396-
If you have outbound firewall rules in your organization, update the rules so that your multi-factor authentication (MFA) servers can communicate with all the necessary IP ranges. The IP ranges are documented in [Azure Active Directory Multi-factor Authentication Server firewall requirements](../authentication/howto-mfaserver-deploy.md#azure-multi-factor-authentication-server-firewall-requirements).
1396+
If you have outbound firewall rules in your organization, update the rules so that your multi-factor authentication (MFA) servers can communicate with all the necessary IP ranges. The IP ranges are documented in [Azure Active Directory Multi-Factor Authentication Server firewall requirements](../authentication/howto-mfaserver-deploy.md#azure-multi-factor-authentication-server-firewall-requirements).
13971397

13981398
---
13991399

@@ -1713,13 +1713,13 @@ You can now view role assignments across all scopes for a role in the "Roles and
17131713

17141714
---
17151715

1716-
### Azure Active Directory Multi-factor Authentication Software Development (Azure MFA SDK) Deprecation
1716+
### Azure Active Directory Multi-Factor Authentication Software Development (Azure MFA SDK) Deprecation
17171717

17181718
**Type:** Deprecated
17191719
**Service category:** MFA
17201720
**Product capability:** Identity Security & Protection
17211721

1722-
The Azure Active Directory Multi-factor Authentication Software Development (Azure MFA SDK) reached the end of life on November 14th, 2018, as first announced in November 2017. Microsoft will be shutting down the SDK service effective on September 30th, 2020. Any calls made to the SDK will fail.
1722+
The Azure Active Directory Multi-Factor Authentication Software Development (Azure MFA SDK) reached the end of life on November 14th, 2018, as first announced in November 2017. Microsoft will be shutting down the SDK service effective on September 30th, 2020. Any calls made to the SDK will fail.
17231723

17241724
If your organization is using the Azure MFA SDK, you need to migrate by September 30th, 2020:
17251725
- Azure MFA SDK for MIM: If you use the SDK with MIM, you should migrate to Azure AD Multi-Factor Authentication (MFA) Server and activate Privileged Access Management (PAM) following these [instructions](/microsoft-identity-manager/working-with-mfaserver-for-mim).
@@ -2528,7 +2528,7 @@ For more information, see [Validate a dynamic group membership rule (preview)](.
25282528
- Require multi-factor authentication (MFA) for administrative roles
25292529
- Enable policy to block legacy authentication
25302530

2531-
**multi-factor authentication (MFA) improvement action updates:** To reflect the need for businesses to ensure the upmost security while applying policies that work with their business, Microsoft Secure Score has removed three improvement actions centered around multifactor authentication and added two.
2531+
**Multi-factor authentication (MFA) improvement action updates:** To reflect the need for businesses to ensure the upmost security while applying policies that work with their business, Microsoft Secure Score has removed three improvement actions centered around multifactor authentication and added two.
25322532

25332533
Removed improvement actions:
25342534

@@ -3323,7 +3323,7 @@ The new **Security** menu includes:
33233323
- Security Center
33243324
- Identity Secure Score
33253325
- Authentication methods
3326-
- multi-factor authentication (MFA)
3326+
- Multi-factor authentication (MFA)
33273327
- Risk reports - Risky users, Risky sign-ins, Risk detections
33283328
- And more...
33293329

@@ -3485,13 +3485,13 @@ We've released an updated version of Azure AD Connect for auto-upgrade customers
34853485

34863486
---
34873487

3488-
### Azure Active Directory Multi-factor Authentication (MFA) Server, version 8.0.2 is now available
3488+
### Azure Active Directory Multi-Factor Authentication (MFA) Server, version 8.0.2 is now available
34893489

34903490
**Type:** Fixed
34913491
**Service category:** MFA
34923492
**Product capability:** Identity Security & Protection
34933493

3494-
If you're an existing customer, who activated Azure AD Multi-factor Authentication (MFA) Server prior to July 1, 2019, you can now download the latest version of Azure AD Multi-factor Authentication (MFA) Server (version 8.0.2). In this new version, we:
3494+
If you're an existing customer, who activated Azure AD Multi-Factor Authentication (MFA) Server prior to July 1, 2019, you can now download the latest version of Azure AD Multi-Factor Authentication (MFA) Server (version 8.0.2). In this new version, we:
34953495

34963496
- Fixed an issue so when Azure AD sync changes a user from Disabled to Enabled, an email is sent to the user.
34973497

@@ -3754,7 +3754,7 @@ New user interface changes are coming to the design of the **Add from the galler
37543754
**Service category:** MFA
37553755
**Product capability:** Identity Security & Protection
37563756

3757-
We're removing the multi-factor authentication (MFA) server IP address from the [Office 365 IP Address and URL Web service](/office365/enterprise/office-365-ip-web-service). If you currently rely on these pages to update your firewall settings, you must make sure you're also including the list of IP addresses documented in the **Azure Active Directory Multi-factor Authentication Server firewall requirements** section of the [Getting started with the Azure Active Directory Multi-factor Authentication Server](../authentication/howto-mfaserver-deploy.md#azure-multi-factor-authentication-server-firewall-requirements) article.
3757+
We're removing the multi-factor authentication (MFA) server IP address from the [Office 365 IP Address and URL Web service](/office365/enterprise/office-365-ip-web-service). If you currently rely on these pages to update your firewall settings, you must make sure you're also including the list of IP addresses documented in the **Azure Active Directory Multi-Factor Authentication Server firewall requirements** section of the [Getting started with the Azure Active Directory Multi-Factor Authentication Server](../authentication/howto-mfaserver-deploy.md#azure-multi-factor-authentication-server-firewall-requirements) article.
37583758

37593759
---
37603760

@@ -4051,15 +4051,15 @@ For more information about setting up your company branding, see [Add branding t
40514051

40524052
---
40534053

4054-
### Azure Active Directory Multi-factor Authentication (MFA) Server is no longer available for new deployments
4054+
### Azure Active Directory Multi-Factor Authentication (MFA) Server is no longer available for new deployments
40554055

40564056
**Type:** Deprecated
40574057
**Service category:** MFA
40584058
**Product capability:** Identity Security & Protection
40594059

40604060
As of July 1, 2019, Microsoft will no longer offer multi-factor authentication (MFA) Server for new deployments. New customers who want to require multifactor authentication in their organization must now use cloud-based Azure AD Multi-Factor Authentication. Customers who activated multi-factor authentication (MFA) Server prior to July 1 won't see a change. You'll still be able to download the latest version, get future updates, and generate activation credentials.
40614061

4062-
For more information, see [Getting started with the Azure Active Directory Multi-factor Authentication Server](../authentication/howto-mfaserver-deploy.md). For more information about cloud-based Azure AD Multi-Factor Authentication, see [Planning a cloud-based Azure AD Multi-Factor Authentication deployment](../authentication/howto-mfa-getstarted.md).
4062+
For more information, see [Getting started with the Azure Active Directory Multi-Factor Authentication Server](../authentication/howto-mfaserver-deploy.md). For more information about cloud-based Azure AD Multi-Factor Authentication, see [Planning a cloud-based Azure AD Multi-Factor Authentication deployment](../authentication/howto-mfa-getstarted.md).
40634063

40644064
---
40654065

@@ -6838,12 +6838,12 @@ For more information, see:
68386838
### Network Policy Server extension for Azure AD Multi-Factor Authentication
68396839

68406840
**Type:** New feature
6841-
**Service category:** Multi-factor Authentication
6841+
**Service category:** Multi-Factor Authentication
68426842
**Product capability:** User authentication
68436843

68446844
The Network Policy Server extension for Azure Active Directory (Azure AD) Multi-Factor Authentication adds cloud-based multifactor authentication capabilities to your authentication infrastructure by using your existing servers. With the Network Policy Server extension, you can add phone call, text message, or phone app verification to your existing authentication flow. You don't have to install, configure, and maintain new servers.
68456845

6846-
This extension was created for organizations that want to protect virtual private network connections without deploying the Azure Active Directory Multi-factor Authentication Server. The Network Policy Server extension acts as an adapter between RADIUS and cloud-based Azure AD Multi-Factor Authentication to provide a second factor of authentication for federated or synced users.
6846+
This extension was created for organizations that want to protect virtual private network connections without deploying the Azure Active Directory Multi-Factor Authentication Server. The Network Policy Server extension acts as an adapter between RADIUS and cloud-based Azure AD Multi-Factor Authentication to provide a second factor of authentication for federated or synced users.
68476847

68486848
For more information, see [Integrate your existing Network Policy Server infrastructure with Azure AD Multi-Factor Authentication](../authentication/howto-mfa-nps-extension.md).
68496849

@@ -6944,10 +6944,10 @@ Due to a service issue, this functionality was temporarily disabled. The issue w
69446944
### New Multi-Factor Authentication features
69456945

69466946
**Type:** New feature
6947-
**Service category:** Multi-factor Authentication
6947+
**Service category:** Multi-Factor Authentication
69486948
**Product capability:** Identity security and protection
69496949

6950-
Azure Active Directory Multi-factor Authentication (MFA) is an essential part of protecting your organization. To make credentials more adaptive and the experience more seamless, the following features were added:
6950+
Azure Active Directory Multi-Factor Authentication (MFA) is an essential part of protecting your organization. To make credentials more adaptive and the experience more seamless, the following features were added:
69516951

69526952
- Multi-factor challenge results are directly integrated into the Azure AD sign-in report, which includes programmatic access to multi-factor authentication (MFA) results.
69536953
- The multi-factor authentication (MFA) configuration is more deeply integrated into the Azure AD configuration experience in the Azure portal.
@@ -7043,4 +7043,4 @@ A hotfix roll-up package (build 4.4.1642.0) is available as of September 25, 201
70437043

70447044
For more information, see [Hotfix rollup package (build 4.4.1642.0) is available for Identity Manager 2016 Service Pack 1](https://support.microsoft.com/help/4021562).
70457045

7046-
---
7046+
---

0 commit comments

Comments
 (0)