Skip to content

Commit ea108fb

Browse files
WIP
1 parent 9d0ae85 commit ea108fb

File tree

3 files changed

+7
-9
lines changed

3 files changed

+7
-9
lines changed

articles/active-directory/conditional-access/concept-conditional-access-policy-common.md

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ Organizations can select individual policy templates and:
4646
- Export the JSON definition for use in programmatic workflows.
4747
- These JSON definitions can be edited and then imported on the main Conditional Access policies page using the **Import policy file** option.
4848

49-
## Common policies
49+
## Conditional Access template policies
5050

5151
- [Require multifactor authentication for admins](howto-conditional-access-policy-admin-mfa.md)\*
5252
- [Require multifactor authentication for all users](howto-conditional-access-policy-all-users-mfa.md)\*
@@ -62,17 +62,15 @@ Organizations can select individual policy templates and:
6262
- [Require approved client apps or app protection](howto-policy-approved-app-or-app-protection.md)
6363
- [Require compliant or Hybrid Azure AD joined device for administrators](howto-conditional-access-policy-compliant-device-admin.md)
6464
- [Use application enforced restrictions for unmanaged devices](howto-policy-app-enforced-restriction.md)
65-
- [Block access by location](howto-conditional-access-policy-location.md)
66-
- [Block access except specific apps](howto-conditional-access-policy-block-access.md)
6765

6866
> \* These four policies when configured together, provide similar functionality enabled by [security defaults](../fundamentals/concept-fundamentals-security-defaults.md).
6967
70-
## Emergency access accounts
68+
## Other common policies
7169

72-
More information about emergency access accounts and why they're important can be found in the following articles:
70+
- [Block access by location](howto-conditional-access-policy-location.md)
71+
- [Block access except specific apps](howto-conditional-access-policy-block-access.md)
7372

74-
- [Manage emergency access accounts in Azure AD](../roles/security-emergency-access.md)
75-
- [Create a resilient access control management strategy with Azure Active Directory](../authentication/concept-resilient-controls.md)
73+
[!INCLUDE [active-directory-policy-exclusions](../../../includes/active-directory-policy-exclude-user.md)]
7674

7775
## Next steps
7876

Loading

includes/active-directory-policy-exclude-user.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,12 @@
22
author: joflore
33
ms.service: active-directory
44
ms.topic: include
5-
ms.date: 09/27/2022
5+
ms.date: 11/29/2022
66
ms.author: joflore
77
---
88
## User exclusions
99

10-
Conditional Access policies are powerful tools, we recommend excluding the following accounts from your policy:
10+
Conditional Access policies are powerful tools, we recommend excluding the following accounts from your policies:
1111

1212
- **Emergency access** or **break-glass** accounts to prevent tenant-wide account lockout. In the unlikely scenario all administrators are locked out of your tenant, your emergency-access administrative account can be used to log into the tenant to take steps to recover access.
1313
- More information can be found in the article, [Manage emergency access accounts in Azure AD](../articles/active-directory/roles/security-emergency-access.md).

0 commit comments

Comments
 (0)