Skip to content

Commit abac3fc

Browse files
authored
Merge pull request #98593 from MicrosoftGuyJFlo/SecurityDefaults
[Azure AD] Security defaults - Updates
2 parents e56ec66 + 93e5768 commit abac3fc

File tree

2 files changed

+5
-5
lines changed

2 files changed

+5
-5
lines changed

articles/active-directory/conditional-access/concept-baseline-protection.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,12 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 11/21/2019
9+
ms.date: 12/10/2019
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
1313
manager: daveba
14-
ms.reviewer: calebb, rogoya
14+
ms.reviewer: rogoya
1515

1616
ms.collection: M365-identity-device-management
1717
---
@@ -84,6 +84,6 @@ To protect privileged actions, this **Require MFA for service management (previe
8484

8585
For more information, see:
8686

87+
* [Enabling security defaults](../fundamentals/concept-fundamentals-security-defaults.md)
8788
* [Common Conditional Access policies](concept-conditional-access-policy-common.md)
8889
* [Five steps to securing your identity infrastructure](../../security/fundamentals/steps-secure-identity.md)
89-
* [What is Conditional Access in Azure Active Directory?](overview.md)

articles/active-directory/conditional-access/concept-conditional-access-policy-common.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 12/03/2019
9+
ms.date: 12/10/2019
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -17,7 +17,7 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Common Conditional Access policies
1919

20-
Baseline protection policies are great but many organizations need more flexibility than they offer. For example, many organizations need the ability to exclude specific accounts like their emergency access or break-glass administration accounts from Conditional Access policies requiring multi-factor authentication. For those organizations, the common policies referenced in this article can be of use.
20+
[Security defaults](../fundamentals/concept-fundamentals-security-defaults.md) are great for some but many organizations need more flexibility than they offer. For example, many need the ability to exclude specific accounts like their emergency access or break-glass administration accounts from Conditional Access policies requiring multi-factor authentication. For those organizations, the common policies referenced in this article can be of use.
2121

2222
![Conditional Access policies in the Azure portal](./media/concept-conditional-access-policy-common/conditional-access-policies-azure-ad-listing.png)
2323

0 commit comments

Comments
 (0)