You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/password-policy.md
+5Lines changed: 5 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,6 +20,9 @@ To manage user security in Azure Active Directory Domain Services (Azure AD DS),
20
20
21
21
This article shows you how to create and configure a fine-grained password policy in Azure AD DS using the Active Directory Administrative Center.
22
22
23
+
> [!NOTE]
24
+
> Password policies are only available for Azure AD DS managed domains created using the Resource Manager deployment model. For older managed domains created using Classic, [migrate from the Classic virtual network model to Resource Manager][migrate-from-classic].
25
+
23
26
## Before you begin
24
27
25
28
To complete this article, you need the following resources and privileges:
@@ -30,6 +33,7 @@ To complete this article, you need the following resources and privileges:
30
33
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
31
34
* An Azure Active Directory Domain Services managed domain enabled and configured in your Azure AD tenant.
32
35
* If needed, complete the tutorial to [create and configure an Azure Active Directory Domain Services instance][create-azure-ad-ds-instance].
36
+
* The Azure AD DS instance must have been created using the Resource Manager deployment model. If needed, [Migrate from the Classic virtual network model to Resource Manager][migrate-from-classic].
33
37
* A Windows Server management VM that is joined to the Azure AD DS managed domain.
34
38
* If needed, complete the tutorial to [create a management VM][tutorial-create-management-vm].
35
39
* A user account that's a member of the *Azure AD DC administrators* group in your Azure AD tenant.
@@ -126,3 +130,4 @@ For more information about password policies and using the Active Directory Admi
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/app-sign-in-risk.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
31
31
To complete the scenario in this tutorial, you need:
32
32
33
33
-**Access to an Azure AD Premium P2 edition** - While Conditional Access is an Azure AD Premium P1 capability, you need a P2 edition because the scenario in this quickstart requires Identity Protection.
34
-
-**Identity Protection** - The scenario in this quickstart requires Identity Protection to be enabled. If you don't know how to enable Identity Protection, see [Enabling Azure Active Directory Identity Protection](../identity-protection/enable.md).
34
+
-**Identity Protection** - The scenario in this quickstart requires Identity Protection to be enabled. If you don't know how to enable Identity Protection, see [Enabling Azure Active Directory Identity Protection](../identity-protection/overview-identity-protection.md).
35
35
-**Tor Browser** - The [Tor Browser](https://www.torproject.org/projects/torbrowser.html.en) is designed to help you preserve your privacy online. Identity Protection detects a sign-in from a Tor Browser as sign-ins from anonymous IP addresses, which have a medium risk level. For more information, see [Azure Active Directory risk detections](../reports-monitoring/concept-risk-events.md).
36
36
-**A test account called Alain Charon** - If you don't know how to create a test account, see [Add cloud-based users](../fundamentals/add-users-azure-active-directory.md#add-a-new-user).
0 commit comments