Skip to content

Commit d38434b

Browse files
updates
1 parent 73a367a commit d38434b

File tree

1 file changed

+1
-12
lines changed

1 file changed

+1
-12
lines changed

articles/active-directory/conditional-access/baseline-protection.md

Lines changed: 1 addition & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ This article provides you with an overview of baseline protection in Azure Activ
3131

3232
Users with access to privileged accounts have unrestricted access to your environment. Due to the power these accounts have, you should treat them with special care. One common method to improve the protection of privileged accounts is to require a stronger form of account verification when they are used to sign-in. In Azure Active Directory, you can get a stronger account verification by requiring multi-factor authentication (MFA).
3333

34-
**Require MFA for admins** is a baseline policy that requires MFA for the following directory roles:
34+
**Require MFA for admins** is a baseline policy that requires MFA for the following directory roles:
3535

3636
* Global administrator
3737
* SharePoint administrator
@@ -46,12 +46,8 @@ Users with access to privileged accounts have unrestricted access to your enviro
4646

4747
This baseline policy provides you with the option to exclude users. You might want to exclude one *[emergency-access administrative account](../users-groups-roles/directory-emergency-access.md)* to ensure you are not locked out of the tenant.
4848

49-
5049
## Enable a baseline policy
5150

52-
While baseline policies are in preview, they are by default not activated. You need to manually enable a policy if you want to activate it. If you explicitly enable the baseline policies at the preview stage, they will remain active when this feature reaches general availability. The planned behavior change is the reason why, in addition to activate and deactivate, you have a third option to set the state of a policy: **Automatically enable policy in the future**. By selecting this option, you can leave the policies disabled during preview, but have Microsoft enable them automatically when this feature reaches general availability. If you do not explicitly enable baseline policies now, and do not select the **Automatically enable policy in the future** option, the policies will remain disabled when this feature reaches general availability.
53-
54-
5551
**To enable a baseline policy:**
5652

5753
1. Sign in to the [Azure portal](https://portal.azure.com) as global administrator, security administrator, or conditional access administrator.
@@ -69,9 +65,6 @@ While baseline policies are in preview, they are by default not activated. You n
6965
5. To enable the policy, click **Use policy immediately**.
7066

7167
6. Click **Save**.
72-
73-
74-
7568

7669
## What you should know
7770

@@ -83,14 +76,10 @@ If you have privileged accounts that are used in your scripts, you should replac
8376

8477
Baseline policies apply to legacy authentication flows like POP, IMAP, older Office desktop client.
8578

86-
87-
88-
8979
## Next steps
9080

9181
For more information, see:
9282

9383
- [Five steps to securing your identity infrastructure](https://docs.microsoft.com/azure/security/azure-ad-secure-steps)
9484

9585
- [What is conditional access in Azure Active Directory?](overview.md)
96-

0 commit comments

Comments
 (0)