Skip to content

Commit d55f738

Browse files
Merge pull request #208807 from Justinha/issue-95991
edits
2 parents de058ff + 6ee9c13 commit d55f738

File tree

2 files changed

+5
-5
lines changed

2 files changed

+5
-5
lines changed

articles/active-directory/authentication/concept-password-ban-bad-on-premises.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 07/17/2020
9+
ms.date: 08/22/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -26,7 +26,7 @@ Azure AD Password Protection is designed with the following principles in mind:
2626
* Domain controllers (DCs) never have to communicate directly with the internet.
2727
* No new network ports are opened on DCs.
2828
* No AD DS schema changes are required. The software uses the existing AD DS *container* and *serviceConnectionPoint* schema objects.
29-
* No minimum AD DS domain or forest functional level (DFL/FFL) is required.
29+
* Any supported AD DS domain or forest functional level can be used.
3030
* The software doesn't create or require accounts in the AD DS domains that it protects.
3131
* User clear-text passwords never leave the domain controller, either during password validation operations or at any other time.
3232
* The software isn't dependent on other Azure AD features. For example, Azure AD password hash sync (PHS) isn't related or required for Azure AD Password Protection.

articles/active-directory/authentication/howto-password-ban-bad-on-premises-deploy.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 08/17/2022
9+
ms.date: 08/22/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -100,8 +100,8 @@ The following core requirements apply:
100100

101101
The following requirements apply to the Azure AD Password Protection DC agent:
102102

103-
* All machines where the Azure AD Password Protection DC agent software will be installed must run Windows Server 2012 or later, including Windows Server Core editions.
104-
* The Active Directory domain or forest doesn't need to be at Windows Server 2012 domain functional level (DFL) or forest functional level (FFL). As mentioned in [Design Principles](concept-password-ban-bad-on-premises.md#design-principles), there's no minimum DFL or FFL required for either the DC agent or proxy software to run.
103+
* Machines where the Azure AD Password Protection DC agent software will be installed can run any supported version of Windows Server, including Windows Server Core editions.
104+
* The Active Directory domain or forest can be any supported functional level.
105105
* All machines where the Azure AD Password Protection DC agent will be installed must have .NET 4.7.2 installed.
106106
* If .NET 4.7.2 is not already installed, download and run the installer found at [The .NET Framework 4.7.2 offline installer for Windows](https://support.microsoft.com/topic/microsoft-net-framework-4-7-2-offline-installer-for-windows-05a72734-2127-a15d-50cf-daf56d5faec2).
107107
* Any Active Directory domain that runs the Azure AD Password Protection DC agent service must use Distributed File System Replication (DFSR) for sysvol replication.

0 commit comments

Comments
 (0)