Skip to content

Commit ffc3575

Browse files
Update multi-factor-authentication-enforcement.md
1 parent baf0d4a commit ffc3575

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

articles/defender-for-cloud/multi-factor-authentication-enforcement.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,11 +5,11 @@ ms.topic: conceptual
55
ms.date: 08/14/2023
66
---
77

8-
# Manage multi-factor authentication (MFA) enforcement on your subscriptions
8+
# Manage multi-factor authentication (MFA) on your subscriptions
99

10-
If you're using passwords, only to authenticate your users, you're leaving an attack vector open. Users often use weak passwords or reuse them for multiple services. With [MFA](https://www.microsoft.com/security/business/identity/mfa) enabled, your accounts are more secure, and users can still authenticate to almost any application with single sign-on (SSO).
10+
If you're using passwords only to authenticate your users, you're leaving an attack vector open. Users often use weak passwords or reuse them for multiple services. With [MFA](https://www.microsoft.com/security/business/identity/mfa) enabled, your accounts are more secure, and users can still authenticate to almost any application with single sign-on (SSO).
1111

12-
There are multiple ways to enable MFA for your Azure Active Directory (AD) users based on the licenses that your organization owns. This page provides the details for each in the context of Microsoft Defender for Cloud.
12+
There are multiple ways to enable MFA for your Azure Active Directory (Azure AD) users based on the licenses that your organization owns. This page provides the details for each in the context of Microsoft Defender for Cloud.
1313

1414
## MFA and Microsoft Defender for Cloud
1515

@@ -21,7 +21,7 @@ The recommendations in the Enable MFA control ensure you're meeting the recommen
2121
- Accounts with write permissions on Azure resources should be MFA enabled
2222
- Accounts with read permissions on Azure resources should be MFA enabled
2323

24-
There are three ways to enable MFA and be compliant with the two recommendations in Defender for Cloud: security defaults, per-user assignment, conditional access (CA) policy.
24+
There are three ways to enable MFA and be compliant with the two recommendations in Defender for Cloud: security defaults, per-user assignment, and conditional access (CA) policy.
2525

2626
### Free option - security defaults
2727

@@ -33,7 +33,7 @@ Customers with Microsoft 365 can use **Per-user assignment**. In this scenario,
3333

3434
### MFA for Azure AD Premium customers
3535

36-
For an improved user experience, upgrade to Azure AD Premium P1 or P2 for **conditional access (CA) policy** options. To configure a CA policy, you'll need [Azure Active Directory (AD) tenant permissions](../active-directory/roles/permissions-reference.md).
36+
For an improved user experience, upgrade to Azure AD Premium P1 or P2 for **conditional access (CA) policy** options. To configure a CA policy, you need [Azure Active Directory (Azure AD) tenant permissions](../active-directory/roles/permissions-reference.md).
3737

3838
Your CA policy must:
3939

@@ -51,7 +51,7 @@ Learn more in the [Azure Conditional Access documentation](../active-directory/c
5151

5252
## Identify accounts without multi-factor authentication (MFA) enabled
5353

54-
You can view the list of user accounts without MFA enabled from either the Defender for Cloud recommendations details page, or using Azure Resource Graph.
54+
You can view the list of user accounts without MFA enabled from either the Defender for Cloud recommendations details page, or by using the Azure Resource Graph.
5555

5656
### View the accounts without MFA enabled in the Azure portal
5757

@@ -63,7 +63,7 @@ To see which accounts don't have MFA enabled, use the following Azure Resource G
6363

6464
1. Open **Azure Resource Graph Explorer**.
6565

66-
:::image type="content" source="./media/multi-factor-authentication-enforcement/opening-resource-graph-explorer.png" alt-text="Launching Azure Resource Graph Explorer** recommendation page" :::
66+
:::image type="content" source="./media/multi-factor-authentication-enforcement/opening-resource-graph-explorer.png" alt-text="Screenshot showing launching the Azure Resource Graph Explorer** recommendation page" lightbox="media/multi-factor-authentication-enforcement/opening-resource-graph-explorer.png":::
6767

6868
1. Enter the following query and select **Run query**.
6969

0 commit comments

Comments
 (0)