Skip to content

Commit 56cbeaf

Browse files
committed
fix numbered list issue
1 parent 7a1c6a3 commit 56cbeaf

1 file changed

Lines changed: 4 additions & 4 deletions

File tree

learn-pr/wwl-sci/manage-implement-authentication-methods/includes/2-explore-authentication-methods.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -42,10 +42,10 @@ Not all MFA methods offer the same level of protection. Microsoft Entra ID intro
4242

4343
The security hierarchy, from least to most secure, is:
4444

45-
1. Password only (no MFA)
46-
2. Password + SMS or voice call
47-
3. Password + Microsoft Authenticator app
48-
4. Passwordless sign-in (Windows Hello for Business, FIDO2 security keys, passkeys in Microsoft Authenticator, certificate-based authentication)
45+
- Password only (no MFA)
46+
- Password + SMS or voice call
47+
- Password + Microsoft Authenticator app
48+
- Passwordless sign-in (Windows Hello for Business, FIDO2 security keys, passkeys in Microsoft Authenticator, certificate-based authentication)
4949

5050
For sensitive resources — such as administrative portals or financial systems — authentication strength policies let you require **phishing-resistant MFA**. Microsoft Entra ID's built-in phishing-resistant strength covers four method families: Windows Hello for Business, FIDO2 security keys, passkeys in Microsoft Authenticator, and certificate-based authentication (CBA). This distinction is critical when designing access policies for Contoso's privileged accounts.
5151

0 commit comments

Comments
 (0)