You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/users-groups-roles/directory-admin-roles-secure.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -128,7 +128,7 @@ Evaluate the accounts that are assigned or eligible for the global admin role. I
128
128
129
129
Require Azure Multi-Factor Authentication (MFA) at sign-in for all individual users who are permanently assigned to one or more of the Azure AD admin roles: Global administrator, Privileged Role administrator, Exchange Online administrator, and SharePoint Online administrator. Use the guide to enable [Multi-factor Authentication (MFA) for your admin accounts](../authentication/howto-mfa-userstates.md) and ensure that all those users have registered at [https://aka.ms/mfasetup](https://aka.ms/mfasetup). More information can be found under step 2 and step 3 of the guide [Protect access to data and services in Office 365](https://support.office.com/article/Protect-access-to-data-and-services-in-Office-365-a6ef28a4-2447-4b43-aae2-f5af6d53c68e).
130
130
131
-
## Stage 2: Mitigate the most frequently used attack techniques
131
+
## Stage 2: Mitigate frequently used attacks
132
132
133
133

134
134
@@ -228,7 +228,7 @@ The Azure Activity Log provides a history of subscription-level events in Azure.
228
228
Prepare Conditional Access policies for on-premises and cloud-hosted applications. If you have users workplace joined devices, get more information from [Setting up on-premises Conditional Access by using Azure Active Directory device registration](../active-directory-device-registration-on-premises-setup.md).
229
229
230
230
231
-
## Stage 3: Build visibility and take full control of admin activity
231
+
## Stage 3: Take full control of admin activity
232
232
233
233

234
234
@@ -357,7 +357,7 @@ To ensure users’ access is protected in connected applications as well, we rec
357
357
358
358
The Cloud App Security SIEM agent integrates Cloud App Security with your SIEM server to enable centralized monitoring of Office 365 alerts and activities. It runs on your server and pulls alerts and activities from Cloud App Security and streams them into the SIEM server. For more information, see [SIEM integration](https://docs.microsoft.com/cloud-app-security/siem).
359
359
360
-
## Stage 4: Continue building defenses to a more proactive security posture
360
+
## Stage 4: Continue building defenses
361
361
362
362

363
363
@@ -433,7 +433,7 @@ Determine if you need to [transfer ownership of an Azure subscription to another
433
433
434
434
For more information about how Microsoft Office 365 handles security incidents, see [Security Incident Management in Microsoft Office 365](https://aka.ms/Office365SIM).
435
435
436
-
## FAQ: Common questions we receive regarding securing privileged access
436
+
## FAQ: Answers to securing privileged access
437
437
438
438
**Q:** What do I do if I haven’t implemented any secure access components yet?
0 commit comments