Skip to content

Commit 033034c

Browse files
authored
changed files by pdets auto publish service, publishid[4438bd8f-9b34-45a8-8f1f-a712695c05bf] and do [publish].
1 parent 3e86e01 commit 033034c

File tree

3 files changed

+5
-5
lines changed

3 files changed

+5
-5
lines changed

learn-pr/wwl-sci/plan-implement-administer-conditional-access/includes/3-exercise-work-with-security-defaults.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
In this exercise, try enabling security defaults.
22

3-
**Note**: Security Defaults are enabled on new subscriptions, so you will mainly be reviewing the process.
3+
**Note**: Security Defaults are enabled on new subscriptions, so you can review the process of enabling and disabling.
44

55
To enable security defaults in your directory:
66

learn-pr/wwl-sci/plan-implement-administer-conditional-access/includes/4-plan-conditional-access-policies.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ Microsoft Entra Conditional Access (CA) analyzes signals, such as user, device,
66

77
:::image type="content" source="../media/conditional-access-overview-how-it-works.png" alt-text="Diagram of how Conditional Access works. Centralize identity provider verifies rules before access is granted.":::
88

9-
Although security defaults ensure a basic level of security, your organization needs more flexibility than security defaults offer. You can use CA to customize security defaults with more granularity and to configure new policies that meet your requirements.
9+
Although security defaults ensure a basic level of security, your organization needs more flexibility than security defaults offer. You can use CA to customize security defaults with more granularities and to configure new policies that meet your requirements.
1010

1111
### Benefits
1212

@@ -40,7 +40,7 @@ Access tokens enable clients to securely call protected web APIs, and they're us
4040

4141
It’s important to understand how access tokens are issued.
4242

43-
:::image type="content" source="../media/access-policy-token-issuance.png" alt-text="Diagram of the flow of issues an access token for conditional access, and how it is used.":::
43+
:::image type="content" source="../media/access-policy-token-issuance.png" alt-text="Diagram of the flow of issues an access token for conditional access, and how it's used.":::
4444

4545
> [!NOTE]
4646
> If no assignment is required, and no CA policy is in effect, the default behavior is to issue an access token.
@@ -109,7 +109,7 @@ The test plan is important to have a comparison between the expected results and
109109

110110
| **Name of policy** | **Scenario** | **Expected result** |
111111
| ------------------------------- | ------------------------------------------------------------------------------------ | ----------------------------------------------------------------------------------------------------------------------------------------------------- |
112-
| Require MFA when working | Authorized user signs into app while on a trusted location / work | User is not prompted to MFA. User is authorized for access. User is connecting from a trusted location. You could choose to require MFA in this case. |
112+
| Require MFA when working | Authorized user signs into app while on a trusted location / work | User isn't prompted to MFA. User is authorized for access. User is connecting from a trusted location. You could choose to require MFA in this case. |
113113
| Require MFA when working | Authorized user signs into app while not on a trusted location / work | User is prompted to MFA and can sign in successfully |
114114
| Require MFA (for admin) | Global Admin signs into app | Admin is prompted to MFA |
115115
| Risky sign-ins | User signs into app using an unapproved browser | User is prompted to MFA |

learn-pr/wwl-sci/plan-implement-administer-conditional-access/includes/8-implement-application-controls.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@ Conditional Access App Control enables user app access and sessions to be monito
22

33
## Conditional Access App Control
44

5-
:::image type="content" source="../media/conditional-access-app-control.png" alt-text="Screenshot of the Use Conditional Access App Control selected in the conditional access wizard.":::
5+
:::image type="content" source="../media/conditional-access-app-control.png" alt-text="Screenshot of the Conditional Access App Control selected in the conditional access wizard.":::
66

77
Conditional Access App Control uses a reverse proxy architecture and is uniquely integrated with Microsoft Entra Conditional Access. Microsoft Entra Conditional Access allows you to enforce access controls on your organization’s apps based on certain conditions. The conditions define who (user or group of users) and what (which cloud apps) and where (which locations and networks) a Conditional Access policy is applied to. After you’ve determined the conditions, you can route users to Microsoft Defender for Cloud Apps where you can protect data with Conditional Access App Control by applying access and session controls.
88

0 commit comments

Comments
 (0)