Skip to content

Commit e1efd19

Browse files
authored
Merge pull request #106178 from MicrosoftGuyJFlo/patch-1
Update concept-fundamentals-security-defaults.md
2 parents d58589e + 84645ab commit e1efd19

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/active-directory/fundamentals/concept-fundamentals-security-defaults.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ One common method to improve protection for all users is to require a stronger f
6666

6767
To give your users easy access to your cloud apps, Azure AD supports a variety of authentication protocols, including legacy authentication. *Legacy authentication* is a term that refers to an authentication request made by:
6868

69-
- Older Office clients that don't use modern authentication (for example, an Office 2010 client).
69+
- Clients that don't use modern authentication (for example, an Office 2010 client).
7070
- Any client that uses older mail protocols such as IMAP, SMTP, or POP3.
7171

7272
Today, the majority of compromising sign-in attempts come from legacy authentication. Legacy authentication does not support Multi-Factor Authentication. Even if you have a Multi-Factor Authentication policy enabled on your directory, an attacker can authenticate by using an older protocol and bypass Multi-Factor Authentication.

0 commit comments

Comments
 (0)