Skip to content

Commit bbb6443

Browse files
[Azure AD] Fundamentals - Rapid response Identity doc
1 parent e7deac7 commit bbb6443

File tree

1 file changed

+9
-13
lines changed

1 file changed

+9
-13
lines changed

articles/active-directory/fundamentals/concept-secure-remote-workers.md

Lines changed: 9 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -21,9 +21,7 @@ It can seem daunting trying to secure your workers in today's world, especially
2121

2222
Each table provides a consistent security recommendation, protecting both Administrator and User identities from the main security attacks (breach replay, phishing, and password spray) while minimizing the user impact and improving the user experience.
2323

24-
The guidance will also allow administrators to configure access to SaaS and on prem applications in a secure and protected manner and is applicable to either cloud or hybrid (synced) identities and applies to users working remotely or in the office.
25-
26-
This guide is not intended to provide guidance at the device, application or data layer. To secure devices or applications please refer to the following documents xxxxxxxx.
24+
The guidance will also allow administrators to configure access to SaaS and on-premises applications in a secure and protected manner and is applicable to either cloud or hybrid (synced) identities and applies to users working remotely or in the office.
2725

2826
This checklist will help you quickly deploy critical recommended actions to protect your organization immediately by explaining how to:
2927

@@ -45,7 +43,7 @@ There are a number of recommendations that Azure AD Free or OFFICE 365 app custo
4543
- Office 365 (O365 E1 / E3 / E5 / F1 / A1 /A3 /A5)
4644
- Office 365 Business (Essentials / Business /Business Premium)
4745
- Microsoft 365 (M365 Business / A1)
48-
- Azure AD free (included with Azure, Dynamics 365, Intune and Power Platform
46+
- Azure AD Free (included with Azure, Dynamics 365, Intune, and Power Platform
4947

5048
#### Azure AD Free Customers / OFFICE 365 APPS (O365 E1, E3, E5, F1, A1)
5149

@@ -68,7 +66,7 @@ There are a number of recommendations that Azure AD Free or OFFICE 365 app custo
6866
The following table is intended to highlight the key actions for the following license subscriptions:
6967

7068
- Azure Active Directory Premium P1 (Azure AD P1)
71-
- Enterprise, Mobility and Security (EMS E3)
69+
- Enterprise Mobility + Security (EMS E3)
7270
- Microsoft 365 (M365 E3 / A3 / F1 / F3)
7371

7472
#### PREMIUM P1 (AADP P1/ M365 E3/A3, EMS E3)
@@ -87,7 +85,7 @@ The following table is intended to highlight the key actions for the following l
8785
| [Enable Secure hybrid access: Secure legacy apps with existing app delivery controllers and networks](../manage-apps/secure-hybrid-access.md) (if applicable). | Publish and protect your on-premises and cloud legacy authentication applications by connecting them to Azure AD with your existing application delivery controller or network. |
8886
| [Implement Password Writeback](../authentication/tutorial-enable-sspr-writeback.md) (if using hybrid identities) | Allow password changes in the cloud to be written back to an on-premises Windows Server Active Directory environment. |
8987
| [Integrate supported SaaS applications from the gallery to Azure AD and enable Single sign on](../manage-apps/add-application-portal.md) | Azure AD has a gallery that contains thousands of pre-integrated applications. Some of the applications your organization uses are probably in the gallery accessible directly from the Azure portal. Provide access to corporate SaaS applications remotely and securely with improved user experience (SSO). |
90-
| [Enable Conditional Access – Device based](../conditional-access/require-managed-devices.md) | Improve security and user experiences with device based Conditional Access. This ensures users can only access from devices that meet your standards for security and compliance. These devices are also known as managed devices. Managed devices can be Intune compliant or Hybrid Azure AD joined devices. |
88+
| [Enable Conditional Access – Device based](../conditional-access/require-managed-devices.md) | Improve security and user experiences with device-based Conditional Access. This step ensures users can only access from devices that meet your standards for security and compliance. These devices are also known as managed devices. Managed devices can be Intune compliant or Hybrid Azure AD joined devices. |
9189
| [Enable Password Protection](../authentication/howto-password-ban-bad-on-premises-deploy.md) | Protect users from using weak and easy to guess passwords. |
9290
| [Designate more than one global administrator](../users-groups-roles/directory-emergency-access.md) | Assign at least two cloud-only permanent global administrator accounts for use if there is an emergency. These accounts are not be used daily and should have long and complex passwords. Break Glass Accounts ensure you can access the service in an emergency. |
9391
| [Use non-global administrative roles where possible](../users-groups-roles/directory-assign-admin-roles.md) | Give your administrators only the access they need to only the areas they need access to. Not all administrators need to be global administrators. |
@@ -100,7 +98,7 @@ The following table is intended to highlight the key actions for the following l
10098
The following table is intended to highlight the key actions for the following license subscriptions:
10199

102100
- Azure Active Directory Premium P2 (Azure AD P2)
103-
- Enterprise, Mobility and Security (EMS E5)
101+
- Enterprise Mobility + Security (EMS E5)
104102
- Microsoft 365 (M365 E5 / A5)
105103

106104
#### PREMIUM P2 (AADP P2/ M365 E5/A5, EMS E5)
@@ -121,7 +119,7 @@ The following table is intended to highlight the key actions for the following l
121119
| [Enable Secure hybrid access: Secure legacy apps with existing app delivery controllers and networks](../manage-apps/secure-hybrid-access.md) (if applicable). | Publish and protect your on-premises and cloud legacy authentication applications by connecting them to Azure AD with your existing application delivery controller or network. |
122120
| [Implement Password Writeback](../authentication/tutorial-enable-sspr-writeback.md) (if using hybrid identities) | Allow password changes in the cloud to be written back to an on-premises Windows Server Active Directory environment. |
123121
| [Integrate supported SaaS applications from the gallery to Azure AD and enable Single sign on](../manage-apps/add-application-portal.md) | Azure AD has a gallery that contains thousands of pre-integrated applications. Some of the applications your organization uses are probably in the gallery accessible directly from the Azure portal. Provide access to corporate SaaS applications remotely and securely with improved user experience (SSO). |
124-
| [Enable Conditional Access – Device based](../conditional-access/require-managed-devices.md) | Improve security and user experiences with device based Conditional Access. This ensures users can only access from devices that meet your standards for security and compliance. These devices are also known as managed devices. Managed devices can be Intune compliant or Hybrid Azure AD joined devices. |
122+
| [Enable Conditional Access – Device based](../conditional-access/require-managed-devices.md) | Improve security and user experiences with device-based Conditional Access. This step ensures users can only access from devices that meet your standards for security and compliance. These devices are also known as managed devices. Managed devices can be Intune compliant or Hybrid Azure AD joined devices. |
125123
| [Enable Password Protection](../authentication/howto-password-ban-bad-on-premises-deploy.md) | Protect users from using weak and easy to guess passwords. |
126124
| [Designate more than one global administrator](../users-groups-roles/directory-emergency-access.md) | Assign at least two cloud-only permanent global administrator accounts for use if there is an emergency. These accounts are not be used daily and should have long and complex passwords. Break Glass Accounts ensure you can access the service in an emergency. |
127125
| [Use non-global administrative roles where possible](../users-groups-roles/directory-assign-admin-roles.md) | Give your administrators only the access they need to only the areas they need access to. Not all administrators need to be global administrators. |
@@ -132,12 +130,10 @@ The following table is intended to highlight the key actions for the following l
132130

133131
## Summary
134132

135-
There are many aspects to a secure Identity infrastructure, but this checklist will help you quickly accomplish a safer and secure identity infrastructure while enabling you users to work remotely. Securing your identity is just part of your security story, protecting data, applications and devices should also be considered. For more information, there is additional information in the following articles which provide an additional view on deploying these features : Azure Active Directory Feature Deployment Guide and Five steps to securing your identity infrastructure.
136-
137-
We appreciate how seriously you take Identity Security and hope this document is a useful roadmap to a more secure posture for your organization.
133+
There are many aspects to a secure Identity infrastructure, but this checklist will help you quickly accomplish a safer and secure identity infrastructure while enabling you users to work remotely. Securing your identity is just part of your security story, protecting data, applications, and devices should also be considered.
138134

139135
## Next steps
140136

141-
For detailed deployment guidance for individual features of Azure AD review the [Azure AD project deployment plans](active-directory-deployment-plans.md).
137+
For detailed deployment guidance for individual features of Azure AD, review the [Azure AD project deployment plans](active-directory-deployment-plans.md).
142138

143-
For an end-to-end Azure AD deployment checklist see the article [Azure Active Directory feature deployment guide](active-directory-deployment-checklist-p2.md)
139+
For an end-to-end Azure AD deployment checklist, see the article [Azure Active Directory feature deployment guide](active-directory-deployment-checklist-p2.md)

0 commit comments

Comments
 (0)