Skip to content

Commit 96ccb9d

Browse files
updates from PM
1 parent beea460 commit 96ccb9d

File tree

3 files changed

+13
-44
lines changed

3 files changed

+13
-44
lines changed

articles/active-directory/fundamentals/concept-fundamentals-security-defaults.md

Lines changed: 13 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -25,8 +25,8 @@ Security defaults make it easier to help protect your organization from these id
2525

2626
- [Requiring all users to register for Azure AD Multi-Factor Authentication](#require-all-users-to-register-for-azure-ad-multi-factor-authentication).
2727
- [Requiring administrators to do multi-factor authentication](#require-administrators-to-do-multi-factor-authentication).
28-
- [Blocking legacy authentication protocols](#block-legacy-authentication-protocols).
2928
- [Requiring users to do multi-factor authentication when necessary](#require-users-to-do-multi-factor-authentication-when-necessary).
29+
- [Blocking legacy authentication protocols](#block-legacy-authentication-protocols).
3030
- [Protecting privileged activities like access to the Azure portal](#protect-privileged-activities-like-access-to-the-azure-portal).
3131

3232
## Who's it for?
@@ -62,7 +62,10 @@ All users in your tenant must register for multi-factor authentication (MFA) in
6262

6363
### Require administrators to do multi-factor authentication
6464

65-
Administrators have increased access to your environment. Because of the power these highly privileged accounts have, you should treat them with special care. One common method to improve the protection of privileged accounts is to require a stronger form of account verification for sign-in. In Azure AD, you can get a stronger account verification by requiring multi-factor authentication. We recommend having separate accounts for administration and standard productivity tasks to significantly reduce the number of times your admins are prompted for MFA.
65+
Administrators have increased access to your environment. Because of the power these highly privileged accounts have, you should treat them with special care. One common method to improve the protection of privileged accounts is to require a stronger form of account verification for sign-in. In Azure AD, you can get a stronger account verification by requiring multi-factor authentication.
66+
67+
> [!TIP]
68+
> We recommend having separate accounts for administration and standard productivity tasks to significantly reduce the number of times your admins are prompted for MFA.
6669
6770
After registration with Azure AD Multi-Factor Authentication is finished, the following Azure AD administrator roles will be required to do extra authentication every time they sign in:
6871

@@ -80,6 +83,14 @@ After registration with Azure AD Multi-Factor Authentication is finished, the fo
8083
- SharePoint administrator
8184
- User administrator
8285

86+
### Require users to do multi-factor authentication when necessary
87+
88+
We tend to think that administrator accounts are the only accounts that need extra layers of authentication. Administrators have broad access to sensitive information and can make changes to subscription-wide settings. But attackers frequently target end users.
89+
90+
After these attackers gain access, they can request access to privileged information for the original account holder. They can even download the entire directory to do a phishing attack on your whole organization.
91+
92+
One common method to improve protection for all users is to require a stronger form of account verification, such as Multi-Factor Authentication, for everyone. After users complete Multi-Factor Authentication registration, they'll be prompted for another authentication whenever necessary. Azure AD decides when a user will be prompted for Multi-Factor Authentication, based on factors such as location, device, role and task. This functionality protects all applications registered with Azure AD including SaaS applications.
93+
8394
### Block legacy authentication protocols
8495

8596
To give your users easy access to your cloud apps, Azure AD supports various authentication protocols, including legacy authentication. *Legacy authentication* is a term that refers to an authentication request made by:
@@ -96,14 +107,6 @@ After security defaults are enabled in your tenant, all authentication requests
96107
97108
- [How to set up a multifunction device or application to send email using Microsoft 365](/exchange/mail-flow-best-practices/how-to-set-up-a-multifunction-device-or-application-to-send-email-using-microsoft-365-or-office-365)
98109

99-
### Require users to do multi-factor authentication when necessary
100-
101-
We tend to think that administrator accounts are the only accounts that need extra layers of authentication. Administrators have broad access to sensitive information and can make changes to subscription-wide settings. But attackers frequently target end users.
102-
103-
After these attackers gain access, they can request access to privileged information for the original account holder. They can even download the entire directory to do a phishing attack on your whole organization.
104-
105-
One common method to improve protection for all users is to require a stronger form of account verification, such as Multi-Factor Authentication, for everyone. After users complete Multi-Factor Authentication registration, they'll be prompted for another authentication whenever necessary. Azure AD decides when a user will be prompted for Multi-Factor Authentication, based on factors such as location, device, role and task. This functionality protects all applications registered with Azure AD including SaaS applications.
106-
107110
### Protect privileged activities like access to the Azure portal
108111

109112
Organizations use various Azure services managed through the Azure Resource Manager API, including:

articles/active-directory/fundamentals/howto-fundamentals-security-defaults.md

Lines changed: 0 additions & 32 deletions
This file was deleted.

articles/active-directory/fundamentals/toc.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -215,8 +215,6 @@
215215
href: concept-fundamentals-mfa-get-started.md
216216
- name: Security defaults
217217
href: concept-fundamentals-security-defaults.md
218-
- name: Enable security defaults
219-
href: howto-fundamentals-security-defaults.md
220218
- name: Block legacy authentication
221219
href: concept-fundamentals-block-legacy-authentication.md
222220
- name: Identity secure score

0 commit comments

Comments
 (0)