You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This article helps you to manage Multi-Factor Authentication settings in the Azure portal. It covers various topics that help you to get the most out of Azure Multi-Factor Authentication. Not all of the features are available in every version of Azure Multi-Factor Authentication.
21
21
22
-
You can access settings related to Azure Multi-Factor Authentication from the Azure portal by browsing to **Azure Active Directory** > **MFA**.
22
+
You can access settings related to Azure Multi-Factor Authentication from the Azure portal by browsing to **Azure Active Directory** > **Security** > **MFA**.
23
23
24
24

25
25
@@ -59,15 +59,15 @@ Use the _block and unblock users_ feature to prevent users from receiving authen
59
59
### Block a user
60
60
61
61
1. Sign in to the [Azure portal](https://portal.azure.com) as an administrator.
62
-
2. Browse to **Azure Active Directory** > **MFA** > **Block/unblock users**.
62
+
2. Browse to **Azure Active Directory** > **Security** > **MFA** > **Block/unblock users**.
63
63
3. Select **Add** to block a user.
64
64
4. Select the **Replication Group**. Enter the username for the blocked user as **username\@domain.com**. Enter a comment in the **Reason** field.
65
65
5. Select **Add** to finish blocking the user.
66
66
67
67
### Unblock a user
68
68
69
69
1. Sign in to the [Azure portal](https://portal.azure.com) as an administrator.
70
-
2. Browse to **Azure Active Directory** > **MFA** > **Block/unblock users**.
70
+
2. Browse to **Azure Active Directory** > **Security** > **MFA** > **Block/unblock users**.
71
71
3. Select **Unblock** in the **Action** column next to the user to unblock.
72
72
4. Enter a comment in the **Reason for unblocking** field.
73
73
5. Select **Unblock** to finish unblocking the user.
@@ -79,7 +79,7 @@ Configure the _fraud alert_ feature so that your users can report fraudulent att
79
79
### Turn on fraud alerts
80
80
81
81
1. Sign in to the [Azure portal](https://portal.azure.com) as an administrator.
82
-
2. Browse to **Azure Active Directory** > **MFA** > **Fraud alert**.
82
+
2. Browse to **Azure Active Directory** > **Security** > **MFA** > **Fraud alert**.
83
83
3. Set the **Allow users to submit fraud alerts** setting to **On**.
84
84
4. Select **Save**.
85
85
@@ -121,7 +121,7 @@ You can use your own recordings or greetings for two-step verification with the
121
121
Before you begin, be aware of the following restrictions:
122
122
123
123
* The supported file formats are .wav and .mp3.
124
-
* The file size limit is 5 MB.
124
+
* The file size limit is 1 MB.
125
125
* Authentication messages should be shorter than 20 seconds. Messages that are longer than 20 seconds can cause the verification to fail. The user might not respond before the message finishes and the verification times out.
126
126
127
127
### Custom message language behavior
@@ -142,7 +142,7 @@ For example, if there is only one custom message, with a language of German:
142
142
### Set up a custom message
143
143
144
144
1. Sign in to the [Azure portal](https://portal.azure.com) as an administrator.
145
-
1. Browse to **Azure Active Directory** > **MFA** > **Phone call settings**.
145
+
1. Browse to **Azure Active Directory** > **Security** > **MFA** > **Phone call settings**.
146
146
1. Select **Add greeting**.
147
147
1. Choose the type of greeting.
148
148
1. Choose the language.
@@ -181,7 +181,7 @@ The _one-time bypass_ feature allows a user to authenticate a single time withou
181
181
### Create a one-time bypass
182
182
183
183
1. Sign in to the [Azure portal](https://portal.azure.com) as an administrator.
184
-
2. Browse to **Azure Active Directory** > **MFA** > **One-time bypass**.
184
+
2. Browse to **Azure Active Directory** > **Security** > **MFA** > **One-time bypass**.
185
185
3. Select **Add**.
186
186
4. If necessary, select the replication group for the bypass.
187
187
5. Enter the username as **username\@domain.com**. Enter the number of seconds that the bypass should last. Enter the reason for the bypass.
@@ -190,7 +190,7 @@ The _one-time bypass_ feature allows a user to authenticate a single time withou
190
190
### View the one-time bypass report
191
191
192
192
1. Sign in to the [Azure portal](https://portal.azure.com).
193
-
2. Browse to **Azure Active Directory** > **MFA** > **One-time bypass**.
193
+
2. Browse to **Azure Active Directory** > **Security** > **MFA** > **One-time bypass**.
194
194
195
195
## Caching rules
196
196
@@ -202,18 +202,20 @@ You can set a time period to allow authentication attempts after a user is authe
202
202
### Set up caching
203
203
204
204
1. Sign in to the [Azure portal](https://portal.azure.com) as an administrator.
205
-
2. Browse to **Azure Active Directory** > **MFA** > **Caching rules**.
205
+
2. Browse to **Azure Active Directory** > **Security** > **MFA** > **Caching rules**.
206
206
3. Select **Add**.
207
207
4. Select the **cache type** from the drop-down list. Enter the maximum number of **cache seconds**.
208
208
5. If necessary, select an authentication type and specify an application.
209
209
6. Select **Add**.
210
210
211
211
## MFA service settings
212
212
213
-
Settings for app passwords, trusted IPs, verification options, and remember multi-factor authentication for Azure Multi-Factor Authentication can be found in service settings. Service settings can be accessed from the Azure portal by browsing to **Azure Active Directory** > **MFA** > **Getting started** > **Configure** > **Additional cloud-based MFA settings**.
213
+
Settings for app passwords, trusted IPs, verification options, and remember multi-factor authentication for Azure Multi-Factor Authentication can be found in service settings. Service settings can be accessed from the Azure portal by browsing to **Azure Active Directory** > **Security** > **MFA** > **Getting started** > **Configure** > **Additional cloud-based MFA settings**.
214
214
215
215

216
216
217
+
The trusted IP address ranges can be private or public.
218
+
217
219
## App passwords
218
220
219
221
Some applications, like Office 2010 or earlier and Apple Mail before iOS 11, don't support two-step verification. The apps aren't configured to accept a second verification. To use these applications, take advantage of the _app passwords_ feature. You can use an app password in place of your traditional password to allow an app to bypass two-step verification and continue working.
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-mfa-reporting.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,16 +21,16 @@ Azure Multi-Factor Authentication provides several reports that can be used by y
21
21
22
22
| Report | Location | Description |
23
23
|:--- |:--- |:--- |
24
-
| Blocked User History | Azure AD > MFA Server > Block/unblock users | Shows the history of requests to block or unblock users. |
24
+
| Blocked User History | Azure AD > Security > MFA > Block/unblock users | Shows the history of requests to block or unblock users. |
25
25
| Usage and fraud alerts | Azure AD > Sign-ins | Provides information on overall usage, user summary, and user details; as well as a history of fraud alerts submitted during the date range specified. |
26
-
| Usage for on-premises components | Azure AD > MFA Server > Activity Report | Provides information on overall usage for MFA through the NPS extension, ADFS, and MFA server. |
27
-
| Bypassed User History | Azure AD > MFA Server > One-time bypass | Provides a history of requests to bypass Multi-Factor Authentication for a user. |
28
-
| Server status | Azure AD > MFA Server > Server status | Displays the status of Multi-Factor Authentication Servers associated with your account. |
26
+
| Usage for on-premises components | Azure AD > Security > MFA > Activity Report | Provides information on overall usage for MFA through the NPS extension, ADFS, and MFA server. |
27
+
| Bypassed User History | Azure AD > Security > MFA > One-time bypass | Provides a history of requests to bypass Multi-Factor Authentication for a user. |
28
+
| Server status | Azure AD > Security > MFA > Server status | Displays the status of Multi-Factor Authentication Servers associated with your account. |
29
29
30
30
## View MFA reports
31
31
32
32
1. Sign in to the [Azure portal](https://portal.azure.com).
33
-
2. On the left, select **Azure Active Directory** > **MFA Server**.
33
+
2. On the left, select **Azure Active Directory** > **Security** > **MFA**.
34
34
3. Select the report that you wish to view.
35
35
36
36

Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/location-condition.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -48,7 +48,7 @@ A named location has the following components:
48
48
-**IP ranges** - One or more IPv4 address ranges in CIDR format. Specifying an IPv6 address range is not supported.
49
49
50
50
> [!NOTE]
51
-
> IPv6 address rangess cannot currently be included in a named location. This measn IPv6 ranges cannot be excluded from a Conditional Access policy.
51
+
> IPv6 address ranges cannot currently be included in a named location. This means IPv6 ranges cannot be excluded from a Conditional Access policy.
52
52
53
53
-**Mark as trusted location** - A flag you can set for a named location to indicate a trusted location. Typically, trusted locations are network areas that are controlled by your IT department. In addition to Conditional Access, trusted named locations are also used by Azure Identity Protection and Azure AD security reports to reduce [false positives](../reports-monitoring/concept-risk-events.md#impossible-travel-to-atypical-locations-1).
54
54
-**Countries/Regions** - This option enables you to select one or more country or region to define a named location.
Copy file name to clipboardExpand all lines: articles/active-directory/devices/hybrid-azuread-join-control.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,7 +30,7 @@ To do a controlled validation of hybrid Azure AD join on Windows current devices
30
30
1. Clear the Service Connection Point (SCP) entry from Active Directory (AD) if it exists
31
31
1. Configure client-side registry setting for SCP on your domain-joined computers using a Group Policy Object (GPO)
32
32
1. If you are using AD FS, you must also configure the client-side registry setting for SCP on your AD FS server using a GPO
33
-
33
+
1. You may also need to [customize synchronization options](../hybrid/how-to-connect-post-installation.md#additional-tasks-available-in-azure-ad-connect) in Azure AD Connect to enable device synchronization.
34
34
35
35
36
36
### Clear the SCP from AD
@@ -79,7 +79,7 @@ Use the following example to create a Group Policy Object (GPO) to deploy a regi
79
79
If you are using AD FS, you first need to configure client-side SCP using the instructions mentioned above but linking the GPO to your AD FS servers. The SCP object defines the source of authority for device objects. It can be on-premises or Azure AD. When this is configured for AD FS, the source for device objects is established as Azure AD.
80
80
81
81
> [!NOTE]
82
-
> If you failed to configure client-side SCP on your AD FS servers, the source for device identities would be considered as on-premises, and if you have device writeback, AD FS would start deleting device objects from on-premises registered device container after a stipulated period.
82
+
> If you failed to configure client-side SCP on your AD FS servers, the source for device identities would be considered as on-premises. ADFS will then start deleting device objects from on-premises directory after the stipulated period defined in the ADFS Device Registration's attribute "MaximumInactiveDays". ADFS Device Registration objects can be found using the [Get-AdfsDeviceRegistration cmdlet](https://docs.microsoft.com/powershell/module/adfs/get-adfsdeviceregistration?view=win10-ps).
83
83
84
84
## Controlled validation of hybrid Azure AD join on Windows down-level devices
0 commit comments