Skip to content

Commit ac7efab

Browse files
authored
Merge pull request #47767 from lootle1/MR52
Technical Review 1008486: Secure Microsoft Entra users with multifact…
2 parents 4b4b625 + 5e76c4d commit ac7efab

16 files changed

+40
-43
lines changed

learn-pr/azure/secure-aad-users-with-mfa/1-introduction.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ metadata:
55
prefetch-feature-rollout: true
66
title: Introduction
77
description: Introduction
8-
ms.date: 11/03/2023
8+
ms.date: 11/01/2024
99
author: Justinha
1010
ms.author: justinha
1111
ms.topic: unit

learn-pr/azure/secure-aad-users-with-mfa/2-azure-multi-factor-authentication.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ metadata:
55
prefetch-feature-rollout: true
66
title: What is Microsoft Entra multifactor authentication?
77
description: Learn about Microsoft Entra multifactor authentication and how it helps protect user accounts.
8-
ms.date: 11/03/2023
8+
ms.date: 11/01/2024
99
author: Justinha
1010
ms.author: justinha
1111
ms.topic: unit

learn-pr/azure/secure-aad-users-with-mfa/3-planning-mfa.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ metadata:
55
prefetch-feature-rollout: true
66
title: Plan your multifactor authentication deployment
77
description: Learn the things to consider as you plan to turn on Microsoft Entra multifactor authentication.
8-
ms.date: 11/03/2023
8+
ms.date: 11/01/2024
99
author: Justinha
1010
ms.author: justinha
1111
ms.topic: unit

learn-pr/azure/secure-aad-users-with-mfa/4-exercise-mfa.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ metadata:
55
prefetch-feature-rollout: true
66
title: Exercise - Enable Microsoft Entra multifactor authentication
77
description: Exercise - Enable Microsoft Entra multifactor authentication
8-
ms.date: 11/03/2023
8+
ms.date: 11/01/2024
99
author: Justinha
1010
ms.author: justinha
1111
ms.topic: unit

learn-pr/azure/secure-aad-users-with-mfa/5-configure-authentication-methods.yml

Lines changed: 8 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -3,13 +3,13 @@ uid: learn.azure-security.secure-aad-users-with-mfa.configure-authentication-met
33
metadata:
44
adobe-target: true
55
prefetch-feature-rollout: true
6-
title: Configure multi-factor authentication methods
7-
description: Configure multi-factor authentication methods
8-
ms.date: 11/03/2023
6+
title: Configure multifactor authentication methods
7+
description: Configure multifactor authentication methods
8+
ms.date: 11/01/2024
99
author: Justinha
1010
ms.author: justinha
1111
ms.topic: unit
12-
title: Configure multi-factor authentication methods
12+
title: Configure multifactor authentication methods
1313
durationInMinutes: 6
1414
content: |
1515
[!include[](includes/5-configure-authentication-methods.md)]
@@ -25,20 +25,19 @@ quiz:
2525
- content: Security questions
2626
isCorrect: true
2727
explanation: "Correct. Security questions can only be used with Self-Service Password Reset."
28-
- content: Which of the following authentication methods _cannot_ be disabled?
28+
- content: Which of the following authentication methods _can't_ be disabled?
2929
choices:
3030
- content: Text message
3131
isCorrect: false
3232
- content: Password
3333
isCorrect: true
34-
explanation: "Correct. Passwords are always usable as an authentication method and cannot be disabled."
34+
explanation: "Correct. Passwords are always usable as an authentication method and can't be disabled."
3535
- content: Microsoft Authenticator app
3636
isCorrect: false
37-
- content: True or False. You must activate multi-factor authentication for all users in the directory you enable it in.
37+
- content: True or False. You must activate multifactor authentication for all users in the directory you enable it in.
3838
choices:
3939
- content: "True"
4040
isCorrect: false
4141
- content: "False"
4242
isCorrect: true
43-
explanation: "Correct. MFA can be enabled for a subset of your users; this is actually a recommendation - start small to ensure you don't lock someone out of your systems."
44-
43+
explanation: "Correct. MFA can be enabled for a subset of your users. Enabling is actually a recommendation. Start small to ensure you don't lock someone out of your systems."

learn-pr/azure/secure-aad-users-with-mfa/6-summary.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ metadata:
55
prefetch-feature-rollout: true
66
title: Summary
77
description: Summary
8-
ms.date: 11/03/2023
8+
ms.date: 11/01/2024
99
author: Justinha
1010
ms.author: justinha
1111
ms.topic: unit

learn-pr/azure/secure-aad-users-with-mfa/includes/1-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
Imagine that you're a security engineer for a large manufacturing firm. Your company works on several big contracts for popular personal electronics companies, including Microsoft. Clients send you their confidential designs, which are then stored in your Azure infrastructure. Plenty of hackers would love to get their hands on the next-generation designs. It's your job to protect them.
22

3-
You did significant work in hardening your network and ensuring that only the right people have access to client data. There's still a big hole to protect: user accounts. This module discusses one of the best ways to stop unauthorized users from gaining access through a username and password: multifactor authentication.
3+
You did significant work in hardening your network and ensuring that only the right people have access to client data. There's still a big hole to protect: user accounts. This module discusses one of the best ways to stop unauthorized users from gaining access through a username and password, which is multifactor authentication.
44

55
## Learning objectives
66

learn-pr/azure/secure-aad-users-with-mfa/includes/3-planning-mfa.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
Before you start deploying Microsoft Entra multifactor authentication, there are several things you should decide.
22

3-
First, consider rolling out MFA in waves. Start with a small group of pilot users to evaluate the complexity of your environment and identify any setup issues or unsupported apps or devices. Then, broaden that group over time and evaluate the results with each pass until your entire company is enrolled.
3+
First, consider rolling out MFA in waves. Start with a small group of pilot users to evaluate the complexity of your environment and identify any setup issues or unsupported apps or devices. Then, broaden that group over time, and evaluate the results with each pass until your entire company is enrolled.
44

55
Next, make sure to create a full communication plan. Microsoft Entra multifactor authentication has several user-interaction requirements, including a registration process. Keep users informed every step of the way. Let them know what they're required to do, important dates, and how to get answers to questions if they have trouble. Microsoft provides [communication templates](https://www.microsoft.com/download/details.aspx?id=57600&WT.mc_id=rss_alldownloads_all) to help draft your communications, including posters and email templates.
66

@@ -10,10 +10,10 @@ Next, make sure to create a full communication plan. Microsoft Entra multifactor
1010

1111
Microsoft Entra multifactor authentication is enforced with *Conditional Access* policies. Conditional Access policies are `IF-THEN` statements. *IF* a user wants to access a resource, *THEN* they must complete an action. For example, a payroll manager wants to access the payroll application and is required to perform multifactor authentication to access it. Other common access requests that might require MFA include:
1212

13-
- IF a specific cloud application is accessed
14-
- IF a user is accessing a specific network
15-
- IF a user is accessing a specific client application
16-
- IF a user is registering a new device
13+
- IF a specific cloud application is accessed.
14+
- IF a user is accessing a specific network.
15+
- IF a user is accessing a specific client application.
16+
- IF a user is registering a new device.
1717

1818
## Deciding supported authentication methods
1919

@@ -26,9 +26,9 @@ When you turn on Microsoft Entra multifactor authentication, you can choose the
2626
| **Call to a phone** | Azure can call a supplied phone number. The user then approves the authentication using the keypad. This method is preferred for backups. |
2727
| **FIDO2 security key** | FIDO2 security keys are an unphishable standards-based passwordless authentication method. These keys are typically USB devices, but could also use Bluetooth or NFC. |
2828
| **Windows Hello for Business** | Windows Hello for Business replaces passwords with strong two-factor authentication on devices. This authentication consists of a type of user credential that is tied to a device and uses a biometric or PIN. |
29-
| **OATH tokens** | OATH tokens can be software applications such as the Microsoft Authenticator app and other authenticator apps, or hardware-based tokens that customers can purchase from different vendors. |
29+
| **OATH tokens** | OATH tokens can be software applications such as the Microsoft Authenticator app and other authenticator apps. They can also be hardware-based tokens that customers can purchase from different vendors. |
3030

31-
Administrators can enable one or more of these options, then users can opt in to each support authentication method they want to use.
31+
Administrators can enable one or more of these options. Then users can opt in to each support authentication method they want to use.
3232

3333
## Selecting an authentication method
3434

learn-pr/azure/secure-aad-users-with-mfa/includes/4-exercise-mfa.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -10,19 +10,17 @@ You can walk through the basic steps necessary to configure and enable Microsoft
1010
## Configure multifactor authentication options
1111

1212
1. Sign in to the [Azure portal](https://portal.azure.com/) using a Global administrator account.
13-
1. Navigate to the Microsoft Entra dashboard using the **Microsoft Entra ID** option in the side menu.
13+
1. Search for **Microsoft Entra ID** and navigate to the Microsoft Entra ID dashboard.
1414
1. Select **Security** in the left-hand menu.
15-
1. Select **multifactor authentication** under the **Manage** heading in the menu. Here, you find options for multifactor authentication.
15+
1. Under the **Manage** menu, select **Multifactor authentication**. Here, you find options for multifactor authentication.
1616

1717
:::image type="content" source="../media/4-mfa-options.png" alt-text="Screenshot showing MFA options in the dashboard.":::
1818

19-
1. Under **Configure**, select **Additional cloud-based multifactor authentication settings**. A new browser page opens where you can see all the MFA options for Azure.
19+
1. Under **Configure**, select **Additional cloud-based multifactor authentication settings**. On the resulting page, you can see all the MFA options for Azure under **Service Settings**.
2020

2121
:::image type="content" source="../media/4-set-mfa.png" alt-text="Screenshot showing MFA configuration.":::
2222

23-
This page is where you select the supported authentication methods. In this example, all of them are selected.
24-
25-
You can also enable or disable *app passwords* here, which allow users to create unique account passwords for apps that don't support multifactor authentication. This feature lets the user authenticate with their Microsoft Entra identity, using a different password specific to that app.
23+
You can enable or disable *app passwords* here, which allow users to create unique account passwords for apps that don't support multifactor authentication. This feature lets the user authenticate with their Microsoft Entra identity, using a different password specific to that app.
2624

2725
## Set up Conditional Access rules for MFA
2826

learn-pr/azure/secure-aad-users-with-mfa/includes/5-configure-authentication-methods.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -33,11 +33,11 @@ The following table lists the authentication methods and the services that can u
3333

3434
### Password
3535

36-
This method is the only one that you cant disable.
36+
This method is the only one that you can't disable.
3737

3838
### Security questions
3939

40-
This method is available only for nonadministrative accounts that use Self-Service Password Reset.
40+
This method is available only for non-administrative accounts that use Self-Service Password Reset.
4141

4242
* Azure stores security questions privately and in a security-enhanced manner on a user object in the directory. Only users can answer the questions, and only during registration. An administrator can't read or change a user's questions or answers.
4343

@@ -55,17 +55,17 @@ Windows Hello for Business provides reliable, fully integrated biometric authent
5555

5656
### FIDO2 security keys
5757

58-
FIDO2 security keys are an unphishable, standards-based passwordless authentication method that can come in any form factor. Fast Identity Online (FIDO) is an open standard for passwordless authentication.
58+
FIDO2 security keys are an unphishable, standards-based, and passwordless authentication method that can come in any form factor. Fast Identity Online (FIDO) is an open standard for passwordless authentication.
5959

60-
Users can register and then select a FIDO2 security key at the sign-in interface as their main means of authentication. These FIDO2 security keys are typically USB devices, but could also use Bluetooth or NFC.
60+
Users can register and then select a FIDO2 security key at the sign-in interface as their main means of authentication. These FIDO2 security keys are typically USB devices but could also use Bluetooth or NFC.
6161

62-
FIDO2 security keys can be used to sign in to their Microsoft Entra ID or Microsoft Entra hybrid joined Windows 10 devices and get single-sign on to their cloud and on-premises resources. Users can also sign in to supported browsers.
62+
FIDO2 security keys can be used to sign in to their Microsoft Entra ID or Microsoft Entra hybrid joined Windows 10 devices. They can get single-sign on to their cloud and on-premises resources. Users can also sign in to supported browsers.
6363

6464
### Microsoft Authenticator app
6565

66-
This method is available for Android and iOS. Users can register their mobile app at [https://aka.ms/mfasetup](https://aka.ms/mfasetup).
66+
This method is available for Android and iOS. Users can [register their mobile app here](https://aka.ms/mfasetup).
6767

68-
* The Microsoft Authenticator app helps prevent unauthorized access to accounts and helps stop fraudulent transactions by pushing a notification to your smartphone or tablet. Users view the notification and confirm or deny the request.
68+
* The Microsoft Authenticator app helps prevent unauthorized access to accounts. It pushes a notification that helps stop fraudulent transactions to your smartphone or tablet. Users view the notification, and confirm or deny the request.
6969

7070
* Users can use the Microsoft Authenticator app or a third-party app as a software token to generate an OATH verification code. After the user enters the username and password, the users enter the code provided by the app on the sign-in screen. The verification code provides a second form of authentication. Users can also set the Microsoft Authenticator app to deliver a push notification that they select and approve to sign in.
7171

@@ -87,7 +87,7 @@ Azure uses an automated voice system to call the number and the owner uses the k
8787

8888
### App password
8989

90-
Certain nonbrowser apps don't support Microsoft Entra multifactor authentication. If users are enabled for Microsoft Entra multifactor authentication and try to use nonbrowser apps, they're unable to authenticate. The app password allows users to continue to authenticate.
90+
Certain non-browser apps don't support Microsoft Entra multifactor authentication. If users are enabled for Microsoft Entra multifactor authentication and try to use nonbrowser apps, they're unable to authenticate. The app password allows users to continue to authenticate.
9191

9292
## Monitoring adoption
9393

0 commit comments

Comments
 (0)