Skip to content

Commit c3d6fe4

Browse files
author
Markus Vilcinskas
committed
workbook01
1 parent 36d6daa commit c3d6fe4

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed

articles/active-directory/reports-monitoring/workbook-conditional-access-gap-analyzer.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ The workbook has four sections:
5858

5959
![Conditional access coverage by location](./media/workbook-conditional-access-gap-analyzer/conditianal-access-by-location.png)
6060

61-
Each of these trends offers a breakdown of sign ins to the user level, so that you can see which users per scenario are bypassing conditional access.
61+
Each of these trends offers a breakdown of sign-ins to the user level, so that you can see which users per scenario are bypassing conditional access.
6262

6363
## Filters
6464

@@ -70,7 +70,7 @@ This workbook supports setting a time range filter.
7070

7171
## Best practice
7272

73-
You should use this workbook to ensure that your tenant is configured to the following Conditional Access best practices:
73+
Use this workbook to ensure that your tenant is configured to the following Conditional Access best practices:
7474

7575
- Block all legacy authentication sign-ins
7676

articles/active-directory/reports-monitoring/workbook-sensitive-operations-report.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ This workbook is split into four sections:
6161

6262
### Modified application and service principal credentials/authentication methods
6363

64-
One of the most common ways for attackers to gain persistence in the environment is by adding new credentials to existing applications and service principals. This allows the attacker to authenticate as the target application or service principal, granting them access to all resources to which it has permissions.
64+
One of the most common ways for attackers to gain persistence in the environment is by adding new credentials to existing applications and service principals. The credentials allow the attacker to authenticate as the target application or service principal, granting them access to all resources to which it has permissions.
6565

6666
This section includes the following data to help you detect:
6767

@@ -90,7 +90,7 @@ This section includes an overview of all changes made to service principal membe
9090

9191
### Modified federation settings
9292

93-
Another common approach to gaining a long-term foothold in the environment is modifying the tenant’s federated domain trusts and effectively adding an additional, attacker controlled, SAML IDP as a trusted authentication source.
93+
Another common approach to gain a long-term foothold in the environment is to modify the tenant’s federated domain trusts, and to add an additional, attacker controlled, SAML IDP as a trusted authentication source.
9494

9595
This section includes the following data:
9696

0 commit comments

Comments
 (0)