Skip to content

Commit a80c1d9

Browse files
changes from PM
1 parent 75b6895 commit a80c1d9

File tree

1 file changed

+30
-30
lines changed

1 file changed

+30
-30
lines changed

articles/active-directory/fundamentals/concept-fundamentals-security-defaults.md

Lines changed: 30 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 02/10/2022
9+
ms.date: 02/11/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -74,35 +74,6 @@ After registration with Azure AD Multi-Factor Authentication is finished, the fo
7474
- SharePoint administrator
7575
- User administrator
7676

77-
#### Emergency access accounts
78-
79-
Every organization should have at least two emergency access account configured.
80-
81-
These accounts may be used in scenarios where your normal administrator accounts can't be used. For example: The person with the most recent Global Administrator access has left the organization. Azure AD prevents the last Global Administrator account from being deleted, but it doesn't prevent the account from being deleted or disabled on-premises. Either situation might make the organization unable to recover the account.
82-
83-
Emergency access accounts are:
84-
85-
- Assigned Global Administrator rights in Azure AD
86-
- Aren't used on a daily basis
87-
- Are protected with a long complex password
88-
89-
The credentials for these emergency access accounts should be stored offline in a secure location such as a fireproof safe. Only authorized individuals should have access to these credentials.
90-
91-
For more detailed information about emergency access accounts, see the article [Manage emergency access accounts in Azure AD](../roles/security-emergency-access.md).
92-
93-
To create an emergency access account:
94-
95-
1. Sign in to the **Azure portal** as an existing Global Administrator.
96-
1. Browse to **Azure Active Directory** > **Users**.
97-
1. Select **New user**.
98-
1. Select **Create user**.
99-
1. Give the account a **User name**.
100-
1. Give the account a **Name**.
101-
1. Create a long and complex password for the account.
102-
1. Under **Roles**, assign the **Global Administrator** role.
103-
1. Under **Usage location**, select the appropriate location.
104-
1. Select **Create**.
105-
10677
### Protecting all users
10778

10879
We tend to think that administrator accounts are the only accounts that need extra layers of authentication. Administrators have broad access to sensitive information and can make changes to subscription-wide settings. But attackers frequently target end users.
@@ -151,6 +122,35 @@ After you enable security defaults in your tenant, any user who's accessing the
151122

152123
The following extra considerations are related to deployment of security defaults.
153124

125+
### Emergency access accounts
126+
127+
Every organization should have at least two emergency access account configured.
128+
129+
These accounts may be used in scenarios where your normal administrator accounts can't be used. For example: The person with the most recent Global Administrator access has left the organization. Azure AD prevents the last Global Administrator account from being deleted, but it doesn't prevent the account from being deleted or disabled on-premises. Either situation might make the organization unable to recover the account.
130+
131+
Emergency access accounts are:
132+
133+
- Assigned Global Administrator rights in Azure AD
134+
- Aren't used on a daily basis
135+
- Are protected with a long complex password
136+
137+
The credentials for these emergency access accounts should be stored offline in a secure location such as a fireproof safe. Only authorized individuals should have access to these credentials.
138+
139+
For more detailed information about emergency access accounts, see the article [Manage emergency access accounts in Azure AD](../roles/security-emergency-access.md).
140+
141+
To create an emergency access account:
142+
143+
1. Sign in to the **Azure portal** as an existing Global Administrator.
144+
1. Browse to **Azure Active Directory** > **Users**.
145+
1. Select **New user**.
146+
1. Select **Create user**.
147+
1. Give the account a **User name**.
148+
1. Give the account a **Name**.
149+
1. Create a long and complex password for the account.
150+
1. Under **Roles**, assign the **Global Administrator** role.
151+
1. Under **Usage location**, select the appropriate location.
152+
1. Select **Create**.
153+
154154
### Authentication methods
155155

156156
These free security defaults allow registration and use of Azure AD Multi-Factor Authentication **using only the Microsoft Authenticator app using notifications**. Conditional Access allows the use of any authentication method the administrator chooses to enable.

0 commit comments

Comments
 (0)