Skip to content

Commit 1589989

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 7be504c + 6dfc02a commit 1589989

File tree

239 files changed

+2895
-1244
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

239 files changed

+2895
-1244
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -22986,6 +22986,11 @@
2298622986
"redirect_url": "/azure/active-directory/device-management-azure-portal",
2298722987
"redirect_document_id": false
2298822988
},
22989+
{
22990+
"source_path": "articles/active-directory/conditional-access/concept-baseline-protection.md",
22991+
"redirect_url": "/azure/active-directory/fundamentals/concept-fundamentals-security-defaults",
22992+
"redirect_document_id": false
22993+
},
2298922994
{
2299022995
"source_path": "articles/active-directory/active-directory-dev-glossary.md",
2299122996
"redirect_url": "/azure/active-directory/develop/active-directory-dev-glossary",
@@ -49855,6 +49860,11 @@
4985549860
"redirect_url": "/azure/lab-services/class-type-mobile-dev-android-studio",
4985649861
"redirect_document_id": true
4985749862
},
49863+
{
49864+
"source_path": "articles/lab-services/class-type-mobile-dev-android-studio.md",
49865+
"redirect_url": "/azure/lab-services/class-types",
49866+
"redirect_document_id": true
49867+
},
4985849868
{
4985949869
"source_path": "articles/lab-services/classroom-labs/class-type-shell-scripting-linux.md",
4986049870
"redirect_url": "/azure/lab-services/class-type-shell-scripting-linux",
@@ -49870,11 +49880,6 @@
4987049880
"redirect_url": "/azure/lab-services/class-type-sql-server",
4987149881
"redirect_document_id": true
4987249882
},
49873-
{
49874-
"source_path": "articles/lab-services/classroom-labs/class-types.md",
49875-
"redirect_url": "/azure/lab-services/class-types",
49876-
"redirect_document_id": true
49877-
},
4987849883
{
4987949884
"source_path": "articles/lab-services/classroom-labs/classroom-labs-concepts.md",
4988049885
"redirect_url": "/azure/lab-services/classroom-labs-concepts",

articles/active-directory/authentication/overview-authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: overview
9-
ms.date: 01/17/2020
9+
ms.date: 07/13/2020
1010

1111
ms.author: iainfou
1212
author: iainfoulds

articles/active-directory/authentication/tutorial-configure-custom-password-protection.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: tutorial
9-
ms.date: 02/27/2020
9+
ms.date: 07/13/2020
1010

1111
ms.author: iainfou
1212
author: iainfoulds
@@ -35,12 +35,12 @@ To complete this tutorial, you need the following resources and privileges:
3535
* If needed, [create one for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
3636
* An account with *global administrator* privileges.
3737
* A non-administrator user with a password you know, such as *testuser*. You test a password change event using this account in this tutorial.
38-
* If you need to create a user, see [Quickstart: Add new users to Azure Active Directory](../add-users-azure-active-directory.md).
38+
* If you need to create a user, see [Quickstart: Add new users to Azure Active Directory](../fundamentals/add-users-azure-active-directory.md).
3939
* To test the password change operation using a banned password, the Azure AD tenant must be [configured for self-service password reset](tutorial-enable-sspr.md).
4040

4141
## What are banned password lists?
4242

43-
Azure AD includes a global banned password list. The contents of the global banned password list isn't based on any external data source. Instead, the global banned password list is based on the ongoing results of Azure AD security telemetry and analysis. When a user or administrator tries to change or reset their credentials, the desired password is checked against the list of banned passwords. The password change request fails if there's a match in the global banned password list.
43+
Azure AD includes a global banned password list. The contents of the global banned password list isn't based on any external data source. Instead, the global banned password list is based on the ongoing results of Azure AD security telemetry and analysis. When a user or administrator tries to change or reset their credentials, the desired password is checked against the list of banned passwords. The password change request fails if there's a match in the global banned password list. You can't edit this default global banned password list.
4444

4545
To give you flexibility in what passwords are allowed, you can also define a custom banned password list. The custom banned password list works alongside the global banned password list to enforce strong passwords in your organization. Organizational-specific terms can be added to the custom banned password list, such as the following examples:
4646

@@ -90,7 +90,7 @@ For a hybrid environment, you can also [deploy Azure AD password protection to a
9090
To see the custom banned password list in action, try to change the password to a variation of one that you added in the previous section. When Azure AD tries to process the password change, the password is matched against an entry in the custom banned password list. An error is then displayed to the user.
9191

9292
> [!NOTE]
93-
> Before a user can reset their password in the web-based portal, the Azure AD tenant must be [configured for self-service password reset](tutorial-enable-sspr.md).
93+
> Before a user can reset their password in the web-based portal, the Azure AD tenant must be [configured for self-service password reset](tutorial-enable-sspr.md). If needed, the user can then [register for SSPR at https://aka.ms/ssprsetup](https://aka.ms/ssprsetup).
9494
9595
1. Go to the **My Apps** page at [https://myapps.microsoft.com](https://myapps.microsoft.com).
9696
1. In the top-right corner, select your name, then choose **Profile** from the drop-down menu.

articles/active-directory/authentication/tutorial-enable-azure-mfa.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: tutorial
9-
ms.date: 02/11/2020
9+
ms.date: 07/13/2020
1010

1111
ms.author: iainfou
1212
author: iainfoulds
@@ -22,6 +22,11 @@ Multi-factor authentication (MFA) is a process where a user is prompted during a
2222

2323
Azure Multi-Factor Authentication and Conditional Access policies give the flexibility to enable MFA for users during specific sign-in events.
2424

25+
> [!IMPORTANT]
26+
> This tutorial shows an administrator how to enable Azure Multi-Factor Authentication.
27+
>
28+
> If your IT team hasn't enabled the ability to use Azure Multi-Factor Authentication or you have problems during sign-in, reach out to your helpdesk for additional assistance.
29+
2530
In this tutorial you learn how to:
2631

2732
> [!div class="checklist"]
@@ -37,9 +42,9 @@ To complete this tutorial, you need the following resources and privileges:
3742
* If needed, [create one for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
3843
* An account with *global administrator* privileges.
3944
* A non-administrator user with a password you know, such as *testuser*. You test the end-user Azure Multi-Factor Authentication experience using this account in this tutorial.
40-
* If you need to create a user, see [Quickstart: Add new users to Azure Active Directory](../add-users-azure-active-directory.md).
45+
* If you need to create a user, see [Quickstart: Add new users to Azure Active Directory](../fundamentals/add-users-azure-active-directory.md).
4146
* A group that the non-administrator user is a member of, such as *MFA-Test-Group*. You enable Azure Multi-Factor Authentication for this group in this tutorial.
42-
* If you need to create a group, see how to [Create a group and add members in Azure Active Directory](../active-directory-groups-create-azure-portal.md).
47+
* If you need to create a group, see how to [Create a group and add members in Azure Active Directory](../fundamentals/active-directory-groups-create-azure-portal.md).
4348

4449
## Create a Conditional Access policy
4550

articles/active-directory/authentication/tutorial-enable-sspr-writeback.md

Lines changed: 12 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: tutorial
9-
ms.date: 04/24/2020
9+
ms.date: 07/13/2020
1010

1111
ms.author: iainfou
1212
author: iainfoulds
@@ -23,6 +23,11 @@ With Azure Active Directory (Azure AD) self-service password reset (SSPR), users
2323

2424
Password writeback can be used to synchronize password changes in Azure AD back to your on-premises AD DS environment. Azure AD Connect provides a secure mechanism to send these password changes back to an existing on-premises directory from Azure AD.
2525

26+
> [!IMPORTANT]
27+
> This tutorial shows an administrator how to enable self-service password reset back to an on-premises environment. If you're an end user already registered for self-service password reset and need to get back into your account, go to https://aka.ms/sspr.
28+
>
29+
> If your IT team hasn't enabled the ability to reset your own password, reach out to your helpdesk for additional assistance.
30+
2631
In this tutorial, you learn how to:
2732

2833
> [!div class="checklist"]
@@ -34,15 +39,15 @@ In this tutorial, you learn how to:
3439

3540
To complete this tutorial, you need the following resources and privileges:
3641

37-
* A working Azure AD tenant with at least an Azure AD Premium P1 or P2 trial license enabled.
42+
* A working Azure AD tenant with at least an Azure AD Premium P1 trial license enabled.
3843
* If needed, [create one for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
3944
* For more information, see [Licensing requirements for Azure AD SSPR](concept-sspr-licensing.md).
4045
* An account with *global administrator* privileges.
4146
* Azure AD configured for self-service password reset.
4247
* If needed, [complete the previous tutorial to enable Azure AD SSPR](tutorial-enable-sspr.md).
4348
* An existing on-premises AD DS environment configured with a current version of Azure AD Connect.
4449
* If needed, configure Azure AD Connect using the [Express](../hybrid/how-to-connect-install-express.md) or [Custom](../hybrid/how-to-connect-install-custom.md) settings.
45-
* To use Password Writeback, your Domain Controllers must be Windows Server 2012 or later.
50+
* To use password writeback, your Domain Controllers must be Windows Server 2012 or later.
4651

4752
## Configure account permissions for Azure AD Connect
4853

@@ -53,9 +58,7 @@ To correctly work with SSPR writeback, the account specified in Azure AD Connect
5358
* **Reset password**
5459
* **Write permissions** on `lockoutTime`
5560
* **Write permissions** on `pwdLastSet`
56-
* **Extended rights** for "Unexpire Password" on either:
57-
* The root object of *each domain* in that forest
58-
* The user organizational units (OUs) you want to be in scope for SSPR
61+
* **Extended rights** for "Unexpire Password" on the root object of *each domain* in that forest, if not already set.
5962

6063
If don't assign these permissions, writeback appears to be configured correctly, but users encounter errors when they manage their on-premises passwords from the cloud. Permissions must be applied to **This object and all descendant objects** for "Unexpire Password" to appear.
6164

@@ -73,7 +76,7 @@ To set up the appropriate permissions for password writeback to occur, complete
7376
1. In the **Applies to** drop-down list, select **Descendant User objects**.
7477
1. Under *Permissions*, select the box for the following option:
7578
* **Reset password**
76-
1. Under *Properties*, select the boxes for the following options. You need to scroll through the list to find these options, which may already be set by default:
79+
1. Under *Properties*, select the boxes for the following options. Scroll through the list to find these options, which may already be set by default:
7780
* **Write lockoutTime**
7881
* **Write pwdLastSet**
7982

@@ -88,13 +91,13 @@ Password policies in the on-premises AD DS environment may prevent password rese
8891
If you update the group policy, wait for the updated policy to replicate, or use the `gpupdate /force` command.
8992

9093
> [!Note]
91-
> In order for passwords to be changed immediately, password writeback must be set to 0. However, if users adhere to the on-premises policies, and the *Minimum password age* is set to a value greater than zero, password writeback will still work after the on-premises policies are evaluated.
94+
> In order for passwords to be changed immediately, password writeback must be set to 0. However, if users adhere to the on-premises policies, and the *Minimum password age* is set to a value greater than zero, password writeback still works after the on-premises policies are evaluated.
9295
9396
## Enable password writeback in Azure AD Connect
9497

9598
One of the configuration options in Azure AD Connect is for password writeback. When this option is enabled, password change events cause Azure AD Connect to synchronize the updated credentials back to the on-premises AD DS environment.
9699

97-
To enable self-service password reset writeback, first enable the writeback option in Azure AD Connect. From your Azure AD Connect server, complete the following steps:
100+
To enable SSPR writeback, first enable the writeback option in Azure AD Connect. From your Azure AD Connect server, complete the following steps:
98101

99102
1. Sign in to your Azure AD Connect server and start the **Azure AD Connect** configuration wizard.
100103
1. On the **Welcome** page, select **Configure**.

articles/active-directory/authentication/tutorial-enable-sspr.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: tutorial
9-
ms.date: 02/04/2020
9+
ms.date: 07/13/2020
1010

1111
ms.author: iainfou
1212
author: iainfoulds
@@ -21,7 +21,7 @@ ms.collection: M365-identity-device-management
2121
Azure Active Directory (Azure AD) self-service password reset (SSPR) gives users the ability to change or reset their password, with no administrator or help desk involvement. If a user's account is locked or they forget their password, they can follow prompts to unblock themselves and get back to work. This ability reduces help desk calls and loss of productivity when a user can't sign in to their device or an application.
2222

2323
> [!IMPORTANT]
24-
> This quickstart shows an administrator how to enable self-service password reset. If you're an end user already registered for self-service password reset and need to get back into your account, go to https://aka.ms/sspr.
24+
> This tutorial shows an administrator how to enable self-service password reset. If you're an end user already registered for self-service password reset and need to get back into your account, go to https://aka.ms/sspr.
2525
>
2626
> If your IT team hasn't enabled the ability to reset your own password, reach out to your helpdesk for additional assistance.
2727
@@ -40,9 +40,9 @@ To complete this tutorial, you need the following resources and privileges:
4040
* If needed, [create one for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
4141
* An account with *Global Administrator* privileges.
4242
* A non-administrator user with a password you know, such as *testuser*. You test the end-user SSPR experience using this account in this tutorial.
43-
* If you need to create a user, see [Quickstart: Add new users to Azure Active Directory](../add-users-azure-active-directory.md).
43+
* If you need to create a user, see [Quickstart: Add new users to Azure Active Directory](../fundamentals/add-users-azure-active-directory.md).
4444
* A group that the non-administrator user is a member of, such as *SSPR-Test-Group*. You enable SSPR for this group in this tutorial.
45-
* If you need to create a group, see how to [Create a group and add members in Azure Active Directory](../active-directory-groups-create-azure-portal.md).
45+
* If you need to create a group, see how to [Create a group and add members in Azure Active Directory](../fundamentals/active-directory-groups-create-azure-portal.md).
4646

4747
## Enable self-service password reset
4848

@@ -77,8 +77,8 @@ When users need to unlock their account or reset their password, they're prompte
7777
* *Mobile app code*
7878
* *Email*
7979
* *Mobile phone*
80-
* *Office phone*
81-
* *Security questions*
80+
81+
Additional authentication methods, such as *Office phone* or *Security questions*, can be enabled as needed to fit your business requirements.
8282

8383
1. To apply the authentication methods, select **Save**.
8484

@@ -94,7 +94,7 @@ An administrator can manually provide this contact information, or users can go
9494

9595
## Configure notifications and customizations
9696

97-
To keep users informed about account activity, you can configure e-mail notifications to be sent when an SSPR event happens. These notifications can cover both regular user accounts and admin accounts. For admin accounts, this notification provides an additional layer of awareness when a privileged administrator account password is reset using SSPR.
97+
To keep users informed about account activity, you can configure e-mail notifications to be sent when an SSPR event happens. These notifications can cover both regular user accounts and admin accounts. For admin accounts, this notification provides an additional layer of awareness when a privileged administrator account password is reset using SSPR. All global admins would be notified when SSPR is used on an admin account.
9898

9999
1. On the **Notifications** page from the menu in the left-hand side, configure the following options:
100100

articles/active-directory/authentication/tutorial-risk-based-sspr-mfa.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: tutorial
9-
ms.date: 05/11/2020
9+
ms.date: 07/13/2020
1010

1111
ms.author: iainfou
1212
author: iainfoulds
@@ -17,7 +17,12 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Tutorial: Use risk detections for user sign-ins to trigger Azure Multi-Factor Authentication or password changes
1919

20-
To protect your users, you can configure risk-based policies in Azure Active Directory (Azure AD) that automatically respond to risky behaviors. Azure AD Identity Protection policies can automatically block a sign-in attempt or require additional action, such as require a password change or prompt for Azure Multi-Factor Authentication. These policies work with existing Azure AD Conditional Access policies as an extra layer of protection for org organization. Users may never trigger a risky behavior in one of these policies, but your organization is protected if an attempt to compromise your security is made.
20+
To protect your users, you can configure risk-based policies in Azure Active Directory (Azure AD) that automatically respond to risky behaviors. Azure AD Identity Protection policies can automatically block a sign-in attempt or require additional action, such as require a password change or prompt for Azure Multi-Factor Authentication. These policies work with existing Azure AD Conditional Access policies as an extra layer of protection for your organization. Users may never trigger a risky behavior in one of these policies, but your organization is protected if an attempt to compromise your security is made.
21+
22+
> [!IMPORTANT]
23+
> This tutorial shows an administrator how to enable risk-based Azure Multi-Factor Authentication.
24+
>
25+
> If your IT team hasn't enabled the ability to use Azure Multi-Factor Authentication or you have problems during sign-in, reach out to your helpdesk for additional assistance.
2126
2227
In this tutorial, you learn how to:
2328

articles/active-directory/conditional-access/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,8 +47,6 @@
4747
href: controls.md
4848
- name: Classic policy migrations
4949
href: policy-migration.md
50-
- name: Baseline protection policies
51-
href: concept-baseline-protection.md
5250
- name: How-to guides
5351
expanded: true
5452
items:

0 commit comments

Comments
 (0)