Skip to content

Commit a31ee45

Browse files
committed
Added doc link to overview and fixed numbering in MFA article.
1 parent a68d83f commit a31ee45

File tree

2 files changed

+10
-10
lines changed

2 files changed

+10
-10
lines changed

articles/virtual-desktop/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ The Azure virtual machines you create for Windows Virtual Desktop must have acce
9898
>[!IMPORTANT]
9999
>We recommend you use the service tags instead of URLs in most cases to prevent service issues. Unblocking these URLs is essential for a reliable Windows Virtual Desktop deployment. Blocking access to these URLs is unsupported and will affect service functionality. These URLs only correspond to Windows Virtual Desktop sites and resources, and don't include URLs for other services like Azure Active Directory.
100100
>
101-
>Windows Virtual Desktop now supports the FQDN tag.
101+
>Windows Virtual Desktop now supports the FQDN tag. For more information, see [Use Azure Firewall to protect Window Virtual Desktop deployments](../firewall/protect-windows-virtual-desktop.md).
102102
103103
The following table lists optional URLs that your Azure virtual machines can have access to:
104104

articles/virtual-desktop/set-up-mfa.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -34,21 +34,21 @@ Here's what you'll need to get started:
3434
This section will show you how to create a Conditional Access policy that requires multi-factor authentication when connecting to Windows Virtual Desktop.
3535

3636
1. Sign in to the **Azure portal** as a global administrator, security administrator, or Conditional Access administrator.
37-
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
38-
1. Select **New policy**.
39-
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
40-
1. Under **Assignments**, select **Users and groups**.
37+
2. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
38+
3. Select **New policy**.
39+
4. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
40+
5. Under **Assignments**, select **Users and groups**.
4141
- Under **Include**, select **Select users and groups** > **Users and groups** > Choose the group created in the prerequisites stage.
4242
- Select **Done**.
43-
1. Under **Cloud apps or actions** > **Include**, select **Select apps**.
43+
6. Under **Cloud apps or actions** > **Include**, select **Select apps**.
4444
- Choose **Windows Virtual Desktop**, then **Select**, and then then **Done**.
4545

4646
![A screenshot of the Cloud apps or actions page. The Windows Virtual Desktop and Windows Virtual Desktop Client apps are highlighted in red.](media/cloud-apps-enterprise.png)
4747

48-
2. Under **Access controls** > **Grant**, select **Grant access**, **Require multi-factor authentication**, and then **Select**.
49-
3. Under **Access controls** > **Session**, select **Sign-in frequency**, set the value to **1** and the unit to **Hours**, and then select **Select**.
50-
4. Confirm your settings and set **Enable policy** to **On**.
51-
5. Select **Create** to enable your policy.
48+
7. Under **Access controls** > **Grant**, select **Grant access**, **Require multi-factor authentication**, and then **Select**.
49+
8. Under **Access controls** > **Session**, select **Sign-in frequency**, set the value to **1** and the unit to **Hours**, and then select **Select**.
50+
9. Confirm your settings and set **Enable policy** to **On**.
51+
10. Select **Create** to enable your policy.
5252

5353
## Next steps
5454

0 commit comments

Comments
 (0)