Skip to content

Commit a17b088

Browse files
WIP
1 parent 95b281b commit a17b088

6 files changed

+22
-22
lines changed

articles/active-directory/identity-protection/concept-identity-protection-policies.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ If risks are detected on a sign-in, users can perform the required access contro
4444
![Sign-in Risk-based Conditional Access policy](./media/concept-identity-protection-policies/sign-in-risk-policy.png)
4545

4646
> [!NOTE]
47-
> Users must have previously registered for Azure AD Multifactor Authentication before triggering the sign-in risk policy.
47+
> Users must have previously registered for Azure AD multifactor authentication before triggering the sign-in risk policy.
4848
4949
## User risk-based Conditional Access policy
5050

@@ -71,13 +71,13 @@ If you already have Identity Protection risk policies set up, we encourage you t
7171

7272
## Azure AD MFA registration policy
7373

74-
Identity Protection can help organizations roll out Azure AD Multifactor Authentication (MFA) using a policy requiring registration at sign-in. Enabling this policy is a great way to ensure new users in your organization have registered for MFA on their first day. Multifactor authentication is one of the self-remediation methods for risk events within Identity Protection. Self-remediation allows your users to take action on their own to reduce helpdesk call volume.
74+
Identity Protection can help organizations roll out Azure AD multifactor authentication (MFA) using a policy requiring registration at sign-in. Enabling this policy is a great way to ensure new users in your organization have registered for MFA on their first day. Multifactor authentication is one of the self-remediation methods for risk events within Identity Protection. Self-remediation allows your users to take action on their own to reduce helpdesk call volume.
7575

76-
More information about Azure AD Multifactor Authentication can be found in the article, [How it works: Azure AD Multifactor Authentication](../authentication/concept-mfa-howitworks.md).
76+
More information about Azure AD multifactor authentication can be found in the article, [How it works: Azure AD multifactor authentication](../authentication/concept-mfa-howitworks.md).
7777

7878
## Next steps
7979

8080
- [Enable Azure AD self-service password reset](../authentication/howto-sspr-deployment.md)
81-
- [Enable Azure AD Multifactor Authentication](../authentication/howto-mfa-getstarted.md)
82-
- [Enable Azure AD Multifactor Authentication registration policy](howto-identity-protection-configure-mfa-policy.md)
81+
- [Enable Azure AD multifactor authentication](../authentication/howto-mfa-getstarted.md)
82+
- [Enable Azure AD multifactor authentication registration policy](howto-identity-protection-configure-mfa-policy.md)
8383
- [Enable sign-in and user risk policies](howto-identity-protection-configure-risk-policies.md)

articles/active-directory/identity-protection/concept-identity-protection-user-experience.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.collection: M365-identity-device-management
1919

2020
With Azure Active Directory Identity Protection, you can:
2121

22-
* Require users to register for Azure AD Multi-Factor Authentication (MFA)
22+
* Require users to register for Azure AD multifactor authentication (MFA)
2323
* Automate remediation of risky sign-ins and compromised users
2424

2525
All of the Identity Protection policies have an impact on the sign in experience for users. Allowing users to register for and use tools like Azure AD MFA and self-service password reset can lessen the impact. These tools along with the appropriate policy choices gives users a self-remediation option when they need it.
@@ -34,7 +34,7 @@ Enabling the Identity Protection policy requiring multi-factor authentication re
3434

3535
![More information required](./media/concept-identity-protection-user-experience/identity-protection-experience-more-info-mfa.png)
3636

37-
1. Complete the guided steps to register for Azure AD Multi-Factor Authentication and complete your sign-in.
37+
1. Complete the guided steps to register for Azure AD multifactor authentication and complete your sign-in.
3838

3939
## Risky sign-in remediation
4040

articles/active-directory/identity-protection/howto-identity-protection-configure-mfa-policy.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -15,20 +15,20 @@ ms.reviewer: sahandle
1515

1616
ms.collection: M365-identity-device-management
1717
---
18-
# How To: Configure the Azure AD Multifactor Authentication registration policy
18+
# How To: Configure the Azure AD multifactor authentication registration policy
1919

20-
Azure Active Directory (Azure AD) Identity Protection helps you manage the roll-out of Azure AD Multifactor Authentication (MFA) registration by configuring a Conditional Access policy to require MFA registration no matter what modern authentication app you're signing in to.
20+
Azure Active Directory (Azure AD) Identity Protection helps you manage the roll-out of Azure AD multifactor authentication (MFA) registration by configuring a Conditional Access policy to require MFA registration no matter what modern authentication app you're signing in to.
2121

22-
## What is the Azure AD Multifactor Authentication registration policy?
22+
## What is the Azure AD multifactor authentication registration policy?
2323

24-
Azure AD Multifactor Authentication provides a means to verify who you are using more than just a username and password. It provides a second layer of security to user sign-ins. In order for users to be able to respond to MFA prompts, they must first register for Azure AD Multifactor Authentication.
24+
Azure AD multifactor authentication provides a means to verify who you are using more than just a username and password. It provides a second layer of security to user sign-ins. In order for users to be able to respond to MFA prompts, they must first register for Azure AD multifactor authentication.
2525

26-
We recommend that you require Azure AD Multifactor Authentication for user sign-ins because it:
26+
We recommend that you require Azure AD multifactor authentication for user sign-ins because it:
2727

2828
- Delivers strong authentication through a range of verification options.
2929
- Plays a key role in preparing your organization to self-remediate from risk detections in Identity Protection.
3030

31-
For more information on Azure AD Multifactor Authentication, see [What is Azure AD Multifactor Authentication?](../authentication/howto-mfa-getstarted.md)
31+
For more information on Azure AD multifactor authentication, see [What is Azure AD multifactor authentication?](../authentication/howto-mfa-getstarted.md)
3232

3333
## Policy configuration
3434

@@ -54,4 +54,4 @@ For an overview of the related user experience, see:
5454

5555
- [Enable Azure AD self-service password reset](../authentication/howto-sspr-deployment.md)
5656

57-
- [Enable Azure AD Multifactor Authentication](../authentication/howto-mfa-getstarted.md)
57+
- [Enable Azure AD multifactor authentication](../authentication/howto-mfa-getstarted.md)

articles/active-directory/identity-protection/howto-identity-protection-configure-risk-policies.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Configure and enable risk policies
1919

20-
As we learned in the previous article, [Identity Protection policies](concept-identity-protection-policies.md), there are two types of risk policies in Azure Active Directory (Azure AD) Conditional Access you can set up to automate the response to risks and allow users to self-remediate when risk is detected:
20+
As we learned in the previous article, [Risk-based access policies](concept-identity-protection-policies.md), there are two types of risk policies in Azure Active Directory (Azure AD) Conditional Access you can set up to automate the response to risks and allow users to self-remediate when risk is detected:
2121

2222
- Sign-in risk policy
2323
- User risk policy
@@ -34,7 +34,7 @@ Configured trusted [network locations](../conditional-access/location-condition.
3434

3535
### Risk remediation
3636

37-
Organizations can choose to block access when risk is detected. Blocking sometimes stops legitimate users from doing what they need to. A better solution is to allow self-remediation using Azure AD Multi-Factor Authentication (MFA) and secure self-service password reset (SSPR).
37+
Organizations can choose to block access when risk is detected. Blocking sometimes stops legitimate users from doing what they need to. A better solution is to allow self-remediation using Azure AD multifactor authentication (MFA) and secure self-service password reset (SSPR).
3838

3939
> [!WARNING]
4040
> Users must register for Azure AD MFA and SSPR before they face a situation requiring remediation. Users not registered are blocked and require administrator intervention.
@@ -50,7 +50,7 @@ Microsoft recommends the below risk policy configurations to protect your organi
5050
- Sign-in risk policy
5151
- Require Azure AD MFA when sign-in risk level is **Medium** or **High**, allowing users to prove it's them by using one of their registered authentication methods, remediating the sign-in risk.
5252

53-
Requiring access control when risk level is low will introduce more user interrupts. Choosing to block access rather than allowing self-remediation options, like secure password reset and multi-factor authentication, will impact your users and administrators. Weigh these choices when configuring your policies.
53+
Requiring access control when risk level is low will introduce more user interrupts. Choosing to block access rather than allowing self-remediation options, like secure password reset and multifactor authentication, will impact your users and administrators. Weigh these choices when configuring your policies.
5454

5555
## Exclusions
5656

@@ -103,7 +103,7 @@ After confirming your settings using [report-only mode](../conditional-access/ho
103103
1. Select **High** and **Medium**.
104104
1. Select **Done**.
105105
1. Under **Access controls** > **Grant**.
106-
1. Select **Grant access**, **Require multi-factor authentication**.
106+
1. Select **Grant access**, **Require multifactor authentication**.
107107
1. Select **Select**.
108108
1. Under **Session**.
109109
1. Select **Sign-in frequency**.
@@ -142,7 +142,7 @@ If you already have risk policies enabled in Identity Protection, we highly reco
142142

143143
## Next steps
144144

145-
- [Enable Azure AD Multi-Factor Authentication registration policy](howto-identity-protection-configure-mfa-policy.md)
145+
- [Enable Azure AD multifactor authentication registration policy](howto-identity-protection-configure-mfa-policy.md)
146146
- [What is risk](concept-identity-protection-risks.md)
147147
- [Investigate risk detections](howto-identity-protection-investigate-risk.md)
148148
- [Simulate risk detections](howto-identity-protection-simulate-risk.md)

articles/active-directory/identity-protection/howto-identity-protection-remediate-unblock.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ For more information about what happens when confirming compromise, see the sect
4747

4848
### Self-remediation with risk policy
4949

50-
If you allow users to self-remediate, with Azure AD Multi-Factor Authentication (MFA) and self-service password reset (SSPR) in your risk policies, they can unblock themselves when risk is detected. These detections are then considered closed. Users must have previously registered for Azure AD MFA and SSPR for use when risk is detected.
50+
If you allow users to self-remediate, with Azure AD multifactor authentication (MFA) and self-service password reset (SSPR) in your risk policies, they can unblock themselves when risk is detected. These detections are then considered closed. Users must have previously registered for Azure AD MFA and SSPR for use when risk is detected.
5151

5252
Some detections may not raise risk to the level where a user self-remediation would be required but administrators should still evaluate these detections. Administrators may determine that extra measures are necessary like [blocking access from locations](../conditional-access/howto-conditional-access-policy-location.md) or lowering the acceptable risk in their policies.
5353

articles/active-directory/identity-protection/howto-identity-protection-simulate-risk.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ More information about each risk detection can be found in the article, What is
3838
Completing the following procedure requires you to use:
3939

4040
- The [Tor Browser](https://www.torproject.org/projects/torbrowser.html.en) to simulate anonymous IP addresses. You might need to use a virtual machine if your organization restricts using the Tor browser.
41-
- A test account that isn't yet registered for Azure AD Multi-Factor Authentication.
41+
- A test account that isn't yet registered for Azure AD multifactor authentication.
4242

4343
**To simulate a sign-in from an anonymous IP, perform the following steps**:
4444

@@ -59,7 +59,7 @@ The procedure below uses a newly created:
5959
Completing the following procedure requires you to use a user account that has:
6060

6161
- At least a 30-day sign-in history.
62-
- Azure AD Multi-Factor Authentication enabled.
62+
- Azure AD multifactor authentication enabled.
6363

6464
**To simulate a sign-in from an unfamiliar location, perform the following steps**:
6565

0 commit comments

Comments
 (0)