Skip to content

Commit dbb9ae0

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into release-ignite-disk-bursting
2 parents c03b939 + f5aaf3c commit dbb9ae0

File tree

219 files changed

+1251
-1154
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

219 files changed

+1251
-1154
lines changed

articles/active-directory-domain-services/tutorial-configure-networking.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -151,7 +151,7 @@ To see this managed domain in action, create and join a virtual machine to the d
151151
> [!div class="nextstepaction"]
152152
> [Join a Windows Server virtual machine to your managed domain](join-windows-vm.md)
153153
154-
<!-- INTERNAL LINKS -->
154+
<!-- INTERNAL LINKS -->
155155
[create-azure-ad-tenant]: ../active-directory/fundamentals/sign-up-organization.md
156156
[associate-azure-ad-tenant]: ../active-directory/fundamentals/active-directory-how-subscriptions-associated-directory.md
157157
[create-azure-ad-ds-instance]: tutorial-create-instance.md

articles/active-directory/authentication/howto-mfa-mfasettings.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 06/03/2019
9+
ms.date: 10/28/2019
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -112,6 +112,8 @@ Configure email addresses here for users who will receive fraud alert emails.
112112
>[!NOTE]
113113
>When Multi-Factor Authentication calls are placed through the public telephone network, sometimes they are routed through a carrier that doesn't support caller ID. Because of this, caller ID is not guaranteed, even though the Multi-Factor Authentication system always sends it.
114114
115+
In the United States, if you haven't configured MFA Caller ID, voice calls from Microsoft come from the following numbers: +1 (866) 539 4191, +1 (855) 330 8653, and +1 (877) 668 6536. If using spam filters, make sure to exclude these numbers.
116+
115117
### Custom voice messages
116118

117119
You can use your own recordings or greetings for two-step verification with the _custom voice messages_ feature. These messages can be used in addition to or to replace the Microsoft recordings.
@@ -384,7 +386,7 @@ Additional details about the use of authentication methods can be found in the a
384386
The _remember Multi-Factor Authentication_ feature for devices and browsers that are trusted by the user is a free feature for all Multi-Factor Authentication users. Users can bypass subsequent verifications for a specified number of days, after they've successfully signed-in to a device by using Multi-Factor Authentication. The feature enhances usability by minimizing the number of times a user has to perform two-step verification on the same device.
385387

386388
>[!IMPORTANT]
387-
>If an account or device is compromised, remembering Multi-Factor Authentication for trusted devices can affect security. If a corporate account becomes compromised or a trusted device is lost or stolen, you should [restore Multi-Factor Authentication on all devices](howto-mfa-userdevicesettings.md#restore-mfa-on-all-remembered-devices-for-a-user).
389+
>If an account or device is compromised, remembering Multi-Factor Authentication for trusted devices can affect security. If a corporate account becomes compromised or a trusted device is lost or stolen, you should [Revoke MFA Sessions](howto-mfa-userdevicesettings.md).
388390
>
389391
>The restore action revokes the trusted status from all devices, and the user is required to perform two-step verification again. You can also instruct your users to restore Multi-Factor Authentication on their own devices with the instructions in [Manage your settings for two-step verification](../user-help/multi-factor-authentication-end-user-manage-settings.md#turn-on-two-factor-verification-prompts-on-a-trusted-device).
390392

articles/active-directory/authentication/howto-mfa-userdevicesettings.md

Lines changed: 2 additions & 46 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 08/29/2019
9+
ms.date: 10/28/2019
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -36,33 +36,9 @@ As an administrator assigned the Authentication Administrator role you can requi
3636
- **Require Re-register MFA** will make it so that when the user signs in next time, they will be requested to setup a new MFA authentication method.
3737
- **Revoke MFA Sessions** clears the user's remembered MFA sessions and requires them to perform MFA the next time it is required by the policy on the device.
3838

39-
## Require users to provide contact methods again
40-
41-
This setting forces the user to complete the registration process again. Non-browser apps continue to work if the user has app passwords for them. You can delete the users app passwords by also selecting **Delete all existing app passwords generated by the selected users**.
42-
43-
### How to require users to provide contact methods again
44-
45-
1. Sign in to the [Azure portal](https://portal.azure.com).
46-
2. On the left, select **Azure Active Directory** > **Users** > **All users**.
47-
3. On the right, select **Multi-Factor Authentication** on the toolbar. The multi-factor authentication page opens.
48-
4. Check the box next to the user or users that you wish to manage. A list of quick step options appears on the right.
49-
5. Select **Manage user settings**.
50-
6. Check the box for **Require selected users to provide contact methods again**.
51-
![Require users to provide contact methods again](./media/howto-mfa-userdevicesettings/reproofup.png)
52-
7. Click **save**.
53-
8. Click **close**.
54-
55-
Organizations can complete these steps with PowerShell using the following as a guide to clear the `StrongAuthenticationMethods` attribute:
56-
57-
```PowerShell
58-
59-
$noMfaConfig = @()
60-
Set-MsolUser -UserPrincipalName $Upn -StrongAuthenticationMethods $noMfaConfig
61-
```
62-
6339
## Delete users existing app passwords
6440

65-
This setting deletes all of the app passwords that a user has created. Non-browser apps that were associated with these app passwords stop working until a new app password is created.
41+
This setting deletes all of the app passwords that a user has created. Non-browser apps that were associated with these app passwords stop working until a new app password is created. Global administrator permissions are required to perform this action.
6642

6743
### How to delete users existing app passwords
6844

@@ -76,26 +52,6 @@ This setting deletes all of the app passwords that a user has created. Non-brows
7652
7. Click **save**.
7753
8. Click **close**.
7854

79-
## Restore MFA on all remembered devices for a user
80-
81-
One of the configurable features of Azure Multi-Factor Authentication is giving your users the option to mark devices as trusted. For more information, see [Configure Azure Multi-Factor Authentication settings](howto-mfa-mfasettings.md#remember-multi-factor-authentication).
82-
83-
Users can opt out of two-step verification for a configurable number of days on their regular devices. If an account is compromised or a trusted device is lost, you need to be able to remove the trusted status and require two-step verification again.
84-
85-
When checked, **Restore multi-factor authentication on all remembered devices** users are required to perform two-step verification the next time they sign in, even if they marked their device as trusted.
86-
87-
### How to restore MFA on all suspended devices for a user
88-
89-
1. Sign in to the [Azure portal](https://portal.azure.com).
90-
2. On the left, select **Azure Active Directory** > **Users** > **All users**.
91-
3. On the right, select **Multi-Factor Authentication** on the toolbar. The multi-factor authentication page opens.
92-
4. Check the box next to the user or users that you wish to manage. A list of quick step options appears on the right.
93-
5. Select **Manage user settings**.
94-
6. Check the box for **Restore multi-factor authentication on all remembered devices**
95-
![Restore multi-factor authentication on all remembered devices](./media/howto-mfa-userdevicesettings/rememberdevices.png)
96-
7. Click **save**.
97-
8. Click **close**.
98-
9955
## Next steps
10056

10157
- Get more information about how to [Configure Azure Multi-Factor Authentication settings](howto-mfa-mfasettings.md)

articles/active-directory/authentication/howto-sspr-windows.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 07/17/2019
9+
ms.date: 10/28/2019
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -35,7 +35,6 @@ For machines running Windows 7, 8, 8.1, and 10 you can enable users to reset the
3535
## General limitations
3636

3737
- Password reset is not currently supported from a Remote Desktop or from Hyper-V enhanced sessions.
38-
- Account unlock, mobile app notification, and mobile app code are not supported.
3938
- This feature does not work for networks with 802.1x network authentication deployed and the option “Perform immediately before user logon”. For networks with 802.1x network authentication deployed it is recommended to use machine authentication to enable this feature.
4039

4140
## Windows 10 password reset

articles/active-directory/devices/assign-local-admin.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -58,10 +58,10 @@ To modify the device administrator role, configure **Additional local administra
5858
>[!NOTE]
5959
> This option requires an Azure AD Premium tenant.
6060
61-
Device administrators are assigned to all Azure AD joined devices. You cannot scope device administrators to a specific set of devices. Updating the device administrator role doesn't necessarily have an immediate impact on the affected users. For the devices, a user is already signed into, the privilege update takes place:
61+
Device administrators are assigned to all Azure AD joined devices. You cannot scope device administrators to a specific set of devices. Updating the device administrator role doesn't necessarily have an immediate impact on the affected users. On devices where a user is already signed into, the privilege update takes place when *both* the below actions happen:
6262

63-
- When a user signs out.
64-
- After 4 hours, when a new Primary Refresh Token is issued.
63+
- 4 hours have passed for Azure AD to issue a new Primary Refresh Token with the appropriate privileges.
64+
- User signs out and signs back in, not lock/unlock, to refresh their profile.
6565

6666
## Manage regular users
6767

articles/active-directory/hybrid/how-to-connect-staged-rollout.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -77,6 +77,8 @@ These scenarios are not supported for staged rollout:
7777

7878
If you want to test Password Hash Sync (PHS) sign-in using staged rollout, please complete the below pre-work to enable Password Hash Sync staged rollout.
7979

80+
For more information on the PowerShell cmdlets used, see [AzureAD 2.0 preview](https://docs.microsoft.com/powershell/module/azuread/?view=azureadps-2.0-preview#staged_rollout)
81+
8082
## Pre-work for Password Hash Sync
8183

8284
1. Enable Password Hash Sync from the [Optional features](how-to-connect-install-custom.md#optional-features) page in Azure AD Connect. 
@@ -235,3 +237,6 @@ Here is how you can track user sign-ins still happening on AD FS for selected st
235237
- **Q: Can we use PowerShell to perform staged rollout?**
236238

237239
- A: Yes, Please find the documentation to use PowerShell to perform staged rollout here.
240+
241+
## Next Steps
242+
- [AzureAD 2.0 preview](https://docs.microsoft.com/powershell/module/azuread/?view=azureadps-2.0-preview#staged_rollout )

articles/active-directory/reports-monitoring/concept-risky-sign-ins.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.topic: conceptual
1313
ms.tgt_pltfrm: na
1414
ms.workload: identity
1515
ms.subservice: report-monitor
16-
ms.date: 11/13/2018
16+
ms.date: 10/28/2019
1717
ms.author: chadam
1818
ms.reviewer: dhanyahk
1919

0 commit comments

Comments
 (0)