You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-[Require approved client apps or app protection](howto-policy-approved-app-or-app-protection.md)
63
63
-[Require compliant or Hybrid Azure AD joined device for administrators](howto-conditional-access-policy-compliant-device-admin.md)
64
64
-[Use application enforced restrictions for unmanaged devices](howto-policy-app-enforced-restriction.md)
65
-
-[Block access by location](howto-conditional-access-policy-location.md)
66
-
-[Block access except specific apps](howto-conditional-access-policy-block-access.md)
67
65
68
66
> \* These four policies when configured together, provide similar functionality enabled by [security defaults](../fundamentals/concept-fundamentals-security-defaults.md).
69
67
70
-
## Emergency access accounts
68
+
## Other common policies
71
69
72
-
More information about emergency access accounts and why they're important can be found in the following articles:
70
+
-[Block access by location](howto-conditional-access-policy-location.md)
71
+
-[Block access except specific apps](howto-conditional-access-policy-block-access.md)
73
72
74
-
-[Manage emergency access accounts in Azure AD](../roles/security-emergency-access.md)
75
-
-[Create a resilient access control management strategy with Azure Active Directory](../authentication/concept-resilient-controls.md)
Copy file name to clipboardExpand all lines: includes/active-directory-policy-exclude-user.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,12 +2,12 @@
2
2
author: joflore
3
3
ms.service: active-directory
4
4
ms.topic: include
5
-
ms.date: 09/27/2022
5
+
ms.date: 11/29/2022
6
6
ms.author: joflore
7
7
---
8
8
## User exclusions
9
9
10
-
Conditional Access policies are powerful tools, we recommend excluding the following accounts from your policy:
10
+
Conditional Access policies are powerful tools, we recommend excluding the following accounts from your policies:
11
11
12
12
-**Emergency access** or **break-glass** accounts to prevent tenant-wide account lockout. In the unlikely scenario all administrators are locked out of your tenant, your emergency-access administrative account can be used to log into the tenant to take steps to recover access.
13
13
- More information can be found in the article, [Manage emergency access accounts in Azure AD](../articles/active-directory/roles/security-emergency-access.md).
0 commit comments