Skip to content

Commit a5c0d74

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into mpio
2 parents 4d06476 + 5bfff2d commit a5c0d74

File tree

192 files changed

+1510
-1486
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

192 files changed

+1510
-1486
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/active-directory/authentication/how-to-mfa-microsoft-managed.md",
5+
"redirect_url": "/azure/active-directory/authentication/concept-authentication-default-enablement",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path_from_root": "/articles/active-directory/authentication/concept-certificate-based-authentication-mobile.md",
510
"redirect_url": "/azure/active-directory/authentication/concept-certificate-based-authentication-mobile-ios",

.openpublishing.redirection.json

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,6 +45,16 @@
4545
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-python",
4646
"redirect_document_id": false
4747
},
48+
{
49+
"source_path": "articles/pytorch-enterprise/pte-overview.md",
50+
"redirect_url": "https://aka.ms/PTELandingPage",
51+
"redirect_document_id": false
52+
},
53+
{
54+
"source_path": "articles/pytorch-enterprise/support-boundaries.md",
55+
"redirect_url": "https://aka.ms/PTELandingPage",
56+
"redirect_document_id": false
57+
},
4858
{
4959
"source_path_from_root": "/articles/storage/blobs/storage-quickstart-blobs-xamarin.md",
5060
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-dotnet",
@@ -9563,6 +9573,11 @@
95639573
"redirect_url": "/azure/azure-toolkit-for-intelliJ",
95649574
"redirect_document_id": false
95659575
},
9576+
{
9577+
"source_path_from_root": "/articles/azure-vmware/enable-public-internet-access.md",
9578+
"redirect_url": "/azure/azure-vmware/enable-public-ip-nsx-edge",
9579+
"redirect_document_id": false
9580+
},
95669581
{
95679582
"source_path_from_root": "/articles/azure-vmware/concepts-monitor-protection.md",
95689583
"redirect_url": "/azure/azure-vmware/integrate-azure-native-services",
@@ -9620,7 +9635,7 @@
96209635
},
96219636
{
96229637
"source_path_from_root": "/articles/azure-vmware/public-ip-usage.md",
9623-
"redirect_url": "/azure/azure-vmware/enable-public-internet-access",
9638+
"redirect_url": "/azure/azure-vmware/enable-public-ip-nsx-edge",
96249639
"redirect_document_id": false
96259640
},
96269641
{

articles/active-directory-b2c/threat-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ The smart lockout feature uses many factors to determine when an account should
5555
- Passwords such as 12456! and 1234567! (or newAccount1234 and newaccount1234) are so similar that the algorithm interprets them as human error and counts them as a single try.
5656
- Larger variations in pattern, such as 12456! and ABCD2!, are counted as separate tries.
5757

58-
When testing the smart lockout feature, use a distinctive pattern for each password you enter. Consider using password generation web apps, such as `https://password-generator.net/`.
58+
When testing the smart lockout feature, use a distinctive pattern for each password you enter. Consider using password generation web apps, such as `https://password-gen.com/`.
5959

6060
When the smart lockout threshold is reached, you'll see the following message while the account is locked: **Your account is temporarily locked to prevent unauthorized use. Try again later**. The error messages can be [localized](localization-string-ids.md#sign-up-or-sign-in-error-messages).
6161

articles/active-directory/authentication/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -56,6 +56,8 @@
5656
items:
5757
- name: How MFA works
5858
href: concept-mfa-howitworks.md
59+
- name: Default enablement
60+
href: concept-authentication-default-enablement.md
5961
- name: Prompts and session lifetime
6062
href: concepts-azure-multi-factor-authentication-prompts-session-lifetime.md
6163
- name: Data residency
@@ -174,8 +176,6 @@
174176
href: how-to-mfa-number-match.md
175177
- name: Use additional context
176178
href: how-to-mfa-additional-context.md
177-
- name: Use Microsoft managed settings
178-
href: how-to-mfa-microsoft-managed.md
179179
- name: Use a Temporary Access Pass
180180
href: howto-authentication-temporary-access-pass.md
181181
- name: Use SMS-based authentication
Lines changed: 67 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,67 @@
1+
---
2+
title: Protecting authentication methods in Azure Active Directory
3+
description: Learn about authentication features that may be enabled by default in Azure Active Directory
4+
5+
services: active-directory
6+
ms.service: active-directory
7+
ms.subservice: authentication
8+
ms.topic: conceptual
9+
ms.date: 10/19/2022
10+
11+
ms.author: justinha
12+
author: mjsantani
13+
manager: amycolannino
14+
15+
ms.collection: M365-identity-device-management
16+
17+
# Customer intent: As an identity administrator, I want to encourage users to understand how default protection can improve our security posture.
18+
---
19+
# Protecting authentication methods in Azure Active Directory
20+
21+
Azure Active Directory (Azure AD) adds and improves security features to better protect customers against increasing attacks. As new attack vectors become known, Azure AD may respond by enabling protection by default to help customers stay ahead of emerging security threats.
22+
23+
For example, in response to increasing MFA fatigue attacks, Microsoft recommended ways for customers to [defend users](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/defend-your-users-from-mfa-fatigue-attacks/ba-p/2365677). One recommendation to prevent users from accidental multifactor authentication (MFA) approvals is to enable [number matching](how-to-mfa-number-match.md). As a result, default behavior for number matching will be explicitly **Enabled** for all Microsoft Authenticator users.
24+
25+
There are two ways for protection of a security feature to be enabled by default:
26+
27+
- After a security feature is released, customers can use the Azure portal or Graph API to test and roll out the change on their own schedule. To help defend against new attack vectors, Azure AD may enable protection of a security feature by default for all tenants on a certain date, and there won't be an option to disable protection. Microsoft schedules default protection far in advance to give customers time to prepare for the change. Customers can't opt out if Microsoft schedules protection by default.
28+
- Protection can be **Microsoft managed**, which means Azure AD can enable or disable protection based upon the current landscape of security threats. Customers can choose whether to allow Microsoft to manage the protection. They can change from **Microsoft managed** to explicitly make the protection **Enabled** or **Disabled** at any time.
29+
30+
>[!NOTE]
31+
>Only a critical security feature will have protection enabled by default.
32+
33+
## Default protection enabled by Azure AD
34+
35+
Number matching is a good example of protection for an authentication method that is currently optional for push notifications in Microsoft Authenticator in all tenants. Customers could choose to enable number matching for push notifications in Microsoft Authenticator for users and groups, or they could leave it disabled. Number matching is already the default behavior for passwordless notifications in Microsoft Authenticator, and users can't opt out.
36+
37+
As MFA fatigue attacks rise, number matching becomes more critical to sign-in security. As a result, Microsoft will change the default behavior for push notifications in Microsoft Authenticator.
38+
39+
>[!NOTE]
40+
>Number matching will begin to be enabled for all users of Microsoft Authenticator starting February 27, 2023.
41+
42+
<!---Add link to Mayur Blog post here--->
43+
44+
## Microsoft managed settings
45+
46+
In addition to configuring Authentication methods policy settings to be either **Enabled** or **Disabled**, IT admins can configure some settings in the Authentication methods policy to be **Microsoft managed**. A setting that is configured as **Microsoft managed** allows Azure AD to enable or disable the setting.
47+
48+
The option to let Azure AD manage the setting is a convenient way for an organization to allow Microsoft to enable or disable a feature by default. Organizations can more easily improve their security posture by trusting Microsoft to manage when a feature should be enabled by default. By configuring a setting as **Microsoft managed** (named *default* in Graph APIs), IT admins can trust Microsoft to enable a security feature they haven't explicitly disabled.
49+
50+
For example, an admin can enable [location and application name](how-to-mfa-number-match.md) in push notifications to give users more context when they approve MFA requests with Microsoft Authenticator. The additional context can also be explicitly disabled, or set as **Microsoft managed**. Today, the **Microsoft managed** configuration for location and application name is **Disabled**, which effectively disables the option for any environment where an admin chooses to let Azure AD manage the setting.
51+
52+
As the security threat landscape changes over time, Microsoft may change the **Microsoft managed** configuration for location and application name to **Enabled**. For customers who want to rely upon Microsoft to improve their security posture, setting security features to **Microsoft managed** is an easy way stay ahead of security threats. They can trust Microsoft to determine the best way to configure security settings based on the current threat landscape.
53+
54+
The following table lists each setting that can be set to Microsoft managed and whether that setting is enabled or disabled by default.
55+
56+
| Setting | Configuration |
57+
|-------------------------------------------------------------------------------------------------|---------------|
58+
| [Registration campaign](how-to-mfa-registration-campaign.md) | Disabled |
59+
| [Location in Microsoft Authenticator notifications](how-to-mfa-additional-context.md) | Disabled |
60+
| [Application name in Microsoft Authenticator notifications](how-to-mfa-additional-context.md) | Disabled |
61+
62+
As threat vectors change, Azure AD may announce default protection for a **Microsoft managed** setting in [release notes](../fundamentals/whats-new.md) and on commonly read forums like [Tech Community](https://techcommunity.microsoft.com/).
63+
64+
## Next steps
65+
66+
[Authentication methods in Azure Active Directory - Microsoft Authenticator](concept-authentication-authenticator-app.md)
67+

articles/active-directory/authentication/how-to-mfa-additional-context.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Use additional context in Microsoft Authenticator notifications (Preview) - Azure Active Directory
2+
title: Use additional context in Microsoft Authenticator notifications - Azure Active Directory
33
description: Learn how to use additional context in MFA notifications
44
ms.service: active-directory
55
ms.subservice: authentication
@@ -11,7 +11,7 @@ ms.collection: M365-identity-device-management
1111

1212
# Customer intent: As an identity administrator, I want to encourage users to use the Microsoft Authenticator app in Azure AD to improve and secure user sign-in events.
1313
---
14-
# How to use additional context in Microsoft Authenticator notifications (Preview) - Authentication methods policy
14+
# How to use additional context in Microsoft Authenticator notifications - Authentication methods policy
1515

1616
This topic covers how to improve the security of user sign-in by adding the application name and geographic location of the sign-in to Microsoft Authenticator passwordless and push notifications.
1717

@@ -47,7 +47,7 @@ You can enable and disable application name and geographic location separately.
4747
Identify your single target group for each of the features. Then use the following API endpoint to change the displayAppInformationRequiredState or displayLocationInformationRequiredState properties under featureSettings to **enabled** and include or exclude the groups you want:
4848

4949
```http
50-
https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMethodConfigurations/MicrosoftAuthenticator
50+
https://graph.microsoft.com/v1.0/authenticationMethodsPolicy/authenticationMethodConfigurations/MicrosoftAuthenticator
5151
```
5252

5353
#### MicrosoftAuthenticatorAuthenticationMethodConfiguration properties
@@ -121,7 +121,7 @@ Only users who are enabled for Microsoft Authenticator under Microsoft Authentic
121121
//Change the Query to PATCH and Run query
122122

123123
{
124-
"@odata.context": "https://graph.microsoft.com/beta/$metadata#authenticationMethodConfigurations/$entity",
124+
"@odata.context": "https://graph.microsoft.com/v1.0/$metadata#authenticationMethodConfigurations/$entity",
125125
"@odata.type": "#microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration",
126126
"id": "MicrosoftAuthenticator",
127127
"state": "enabled",
@@ -149,7 +149,7 @@ Only users who are enabled for Microsoft Authenticator under Microsoft Authentic
149149
}
150150
}
151151
},
152-
"[email protected]": "https://graph.microsoft.com/beta/$metadata#authenticationMethodsPolicy/authenticationMethodConfigurations('MicrosoftAuthenticator')/microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration/includeTargets",
152+
"[email protected]": "https://graph.microsoft.com/v1.0/$metadata#authenticationMethodsPolicy/authenticationMethodConfigurations('MicrosoftAuthenticator')/microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration/includeTargets",
153153
"includeTargets": [
154154
{
155155
"targetType": "group",
@@ -173,7 +173,7 @@ Only users who are enabled for Microsoft Authenticator under Microsoft Authentic
173173

174174
```json
175175
{
176-
"@odata.context": "https://graph.microsoft.com/beta/$metadata#authenticationMethodConfigurations/$entity",
176+
"@odata.context": "https://graph.microsoft.com/v1.0/$metadata#authenticationMethodConfigurations/$entity",
177177
"@odata.type": "#microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration",
178178
"id": "MicrosoftAuthenticator",
179179
"state": "enabled",
@@ -201,7 +201,7 @@ Only users who are enabled for Microsoft Authenticator under Microsoft Authentic
201201
}
202202
}
203203
},
204-
"[email protected]": "https://graph.microsoft.com/beta/$metadata#authenticationMethodsPolicy/authenticationMethodConfigurations('MicrosoftAuthenticator')/microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration/includeTargets",
204+
"[email protected]": "https://graph.microsoft.com/v1.0/$metadata#authenticationMethodsPolicy/authenticationMethodConfigurations('MicrosoftAuthenticator')/microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration/includeTargets",
205205
"includeTargets": [
206206
{
207207
"targetType": "group",
@@ -216,7 +216,7 @@ Only users who are enabled for Microsoft Authenticator under Microsoft Authentic
216216
To verify, run GET again and verify the ObjectID:
217217

218218
```http
219-
GET https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMethodConfigurations/MicrosoftAuthenticator
219+
GET https://graph.microsoft.com/v1.0/authenticationMethodsPolicy/authenticationMethodConfigurations/MicrosoftAuthenticator
220220
```
221221

222222
#### Example of how to disable application name and only enable geographic location
@@ -230,7 +230,7 @@ Only users who are enabled for Microsoft Authenticator under Microsoft Authentic
230230

231231
```json
232232
{
233-
"@odata.context": "https://graph.microsoft.com/beta/$metadata#authenticationMethodConfigurations/$entity",
233+
"@odata.context": "https://graph.microsoft.com/v1.0/$metadata#authenticationMethodConfigurations/$entity",
234234
"@odata.type": "#microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration",
235235
"id": "MicrosoftAuthenticator",
236236
"state": "enabled",
@@ -258,7 +258,7 @@ Only users who are enabled for Microsoft Authenticator under Microsoft Authentic
258258
}
259259
}
260260
},
261-
"[email protected]": "https://graph.microsoft.com/beta/$metadata#authenticationMethodsPolicy/authenticationMethodConfigurations('MicrosoftAuthenticator')/microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration/includeTargets",
261+
"[email protected]": "https://graph.microsoft.com/v1.0/$metadata#authenticationMethodsPolicy/authenticationMethodConfigurations('MicrosoftAuthenticator')/microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration/includeTargets",
262262
"includeTargets": [
263263
{
264264
"targetType": "group",
@@ -283,7 +283,7 @@ Only users who are enabled for Microsoft Authenticator under Microsoft Authentic
283283

284284
```json
285285
{
286-
"@odata.context": "https://graph.microsoft.com/beta/$metadata#authenticationMethodConfigurations/$entity",
286+
"@odata.context": "https://graph.microsoft.com/v1.0/$metadata#authenticationMethodConfigurations/$entity",
287287
"@odata.type": "#microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration",
288288
"id": "MicrosoftAuthenticator",
289289
"state": "enabled",
@@ -311,7 +311,7 @@ Only users who are enabled for Microsoft Authenticator under Microsoft Authentic
311311
}
312312
}
313313
},
314-
"[email protected]": "https://graph.microsoft.com/beta/$metadata#authenticationMethodsPolicy/authenticationMethodConfigurations('MicrosoftAuthenticator')/microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration/includeTargets",
314+
"[email protected]": "https://graph.microsoft.com/v1.0/$metadata#authenticationMethodsPolicy/authenticationMethodConfigurations('MicrosoftAuthenticator')/microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration/includeTargets",
315315
"includeTargets": [
316316
{
317317
"targetType": "group",
@@ -333,7 +333,7 @@ Only users who are enabled for Microsoft Authenticator under Microsoft Authentic
333333

334334
```json
335335
{
336-
"@odata.context": "https://graph.microsoft.com/beta/$metadata#authenticationMethodConfigurations/$entity",
336+
"@odata.context": "https://graph.microsoft.com/v1.0/$metadata#authenticationMethodConfigurations/$entity",
337337
"@odata.type": "#microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration",
338338
"id": "MicrosoftAuthenticator",
339339
"state": "enabled",
@@ -350,7 +350,7 @@ Only users who are enabled for Microsoft Authenticator under Microsoft Authentic
350350
}
351351
}
352352
},
353-
"[email protected]": "https://graph.microsoft.com/beta/$metadata#authenticationMethodsPolicy/authenticationMethodConfigurations('MicrosoftAuthenticator')/microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration/includeTargets",
353+
"[email protected]": "https://graph.microsoft.com/v1.0/$metadata#authenticationMethodsPolicy/authenticationMethodConfigurations('MicrosoftAuthenticator')/microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration/includeTargets",
354354
"includeTargets": [
355355
{
356356
"targetType": "group",
@@ -368,7 +368,7 @@ To turn off additional context, you'll need to PATCH **displayAppInformationRequ
368368

369369
```json
370370
{
371-
"@odata.context": "https://graph.microsoft.com/beta/$metadata#authenticationMethodConfigurations/$entity",
371+
"@odata.context": "https://graph.microsoft.com/v1.0/$metadata#authenticationMethodConfigurations/$entity",
372372
"@odata.type": "#microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration",
373373
"id": "MicrosoftAuthenticator",
374374
"state": "enabled",
@@ -396,7 +396,7 @@ To turn off additional context, you'll need to PATCH **displayAppInformationRequ
396396
}
397397
}
398398
},
399-
"[email protected]": "https://graph.microsoft.com/beta/$metadata#authenticationMethodsPolicy/authenticationMethodConfigurations('MicrosoftAuthenticator')/microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration/includeTargets",
399+
"[email protected]": "https://graph.microsoft.com/v1.0/$metadata#authenticationMethodsPolicy/authenticationMethodConfigurations('MicrosoftAuthenticator')/microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration/includeTargets",
400400
"includeTargets": [
401401
{
402402
"targetType": "group",

0 commit comments

Comments
 (0)