Skip to content

Commit d93e932

Browse files
committed
fixed acrolinx score issues
1 parent f144a50 commit d93e932

3 files changed

Lines changed: 12 additions & 12 deletions

File tree

learn-pr/wwl-sci/plan-implement-administer-conditional-access/includes/1-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
Conditional Access gives a fine granularity of control over which users and identities can perform specific activities, access resources, and ensure data and systems are safe. With the introduction of Microsoft Entra Agent ID, that control now extends to AI agentsyou apply the same Zero Trust principles to agent identities that you apply to users and workload identities.
1+
Conditional Access gives a fine granularity of control over which users and identities can perform specific activities, access resources, and ensure data and systems are safe. With the introduction of Microsoft Entra Agent ID control, now extends to AI agentsyou apply the same Zero Trust principles to agent identities that you apply to users and workload identities.
22

33
## Learning objectives
44

learn-pr/wwl-sci/plan-implement-administer-conditional-access/includes/2-plan-security-defaults.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
Managing security can be difficult with common identity-related attacks like password spray, replay, and phishing becoming more and more popular. Security defaults provide secure default settings that Microsoft manages on behalf of organizations to keep customers safe until organizations are ready to manage their own identity security story. Security defaults provide preconfigured security settings, such as:
1+
Managing security can be difficult with common identity-related attacks like password spray, replay, and phishing becoming more popular. Security defaults provide secure default settings that Microsoft manages on behalf of organizations to keep customers safe until organizations are ready to manage their own identity security story. Security defaults provide preconfigured security settings, such as:
22

33
- Requiring all users to register for multifactor authentication.
44
- Requiring administrators to perform multifactor authentication.
@@ -19,20 +19,20 @@ To enable or disable security defaults, sign in to the [Microsoft Entra admin ce
1919
| **Who should use security defaults?** | **Who shouldn't use security defaults?** |
2020
| ----------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------- |
2121
| Organizations that want to increase their security posture but don't know how or where to start | Organizations currently using Conditional Access policies to bring signals together, make decisions, and enforce organizational policies |
22-
| Organizations utilizing the free tier of Microsoft Entra ID Licensing | Organizations with Microsoft Entra ID Premium licenses |
22+
| Organizations utilizing the free tier of Microsoft Entra ID Licensing | Organization with Microsoft Entra ID Premium licenses |
2323
| | Organizations with complex security requirements that warrant using Conditional Access |
2424

2525
## Policies enforced
2626

2727
### Unified multifactor authentication registration
2828

29-
All users in your tenant must register for multifactor authentication (MFA) using the Microsoft Authenticator app. Registration is required immediatelythere is no grace period. When users sign in after security defaults are enabled, they're prompted to register before they can access any resources. The MFA prompt uses number matching, where users enter a number displayed on screen into the Microsoft Authenticator app, which helps prevent MFA fatigue attacks.
29+
All users in your tenant must register for multifactor authentication (MFA) using the Microsoft Authenticator app. Registration is required immediatelythere's no grace period. When users sign in after security defaults are enabled, they're prompted to register before they can access any resources. The MFA prompt uses number matching, where users enter a number displayed on screen into the Microsoft Authenticator app, which helps prevent MFA fatigue attacks.
3030

3131
### Protecting administrators
3232

33-
Users with privileged access have increased access to your environment. Due to the power these accounts have, you should treat them with special care. One common method to improve the protection of privileged accounts is to require a stronger form of account verification for sign-in. In Microsoft Entra ID, you can get a stronger account verification by requiring multifactor authentication.
33+
Users with privileged access often increase access to your environment. Due to the power these accounts have, you should treat them with special care. One common method to improve the protection of privileged accounts is to require a stronger form of account verification for sign-in. In Microsoft Entra ID, you can get a stronger account verification by requiring multifactor authentication.
3434

35-
After registration with multifactor authentication is finished, the following Microsoft Entra administrator roles are required to perform additional authentication every time they sign in:
35+
After registration with multifactor authentication is finished, the following Microsoft Entra administrator roles are required to perform other authentication every time they sign in:
3636

3737
- Global Administrator
3838
- Application Administrator
@@ -57,15 +57,15 @@ We tend to think that administrator accounts are the only accounts that need ext
5757

5858
After these attackers gain access, they can request access to privileged information on behalf of the original account holder. They can even download the entire directory to perform a phishing attack on your whole organization.
5959

60-
One common method to improve protection for all users is to require a stronger form of account verification, such as multifactor authentication, for everyone. After users complete Multifactor Authentication registration, they'll be prompted for additional authentication whenever necessary. This functionality protects all applications registered with Microsoft Entra ID, including SaaS applications.
60+
One common method to improve protection for all users is to require a stronger form of account verification, such as multifactor authentication, for everyone. After users complete Multifactor Authentication registration, they'll be prompted for extra authentication whenever necessary. This functionality protects all applications registered with Microsoft Entra ID, including SaaS applications.
6161

6262
### Blocking legacy authentication
6363

64-
To give your users easy access to your cloud apps, Microsoft Entra ID supports a variety of authentication protocols, including legacy authentication. *Legacy authentication* is an authentication request made by:
64+
To give your users easy access to your cloud apps, Microsoft Entra ID supports various authentication protocols, including legacy authentication. *Legacy authentication* is an authentication request made by:
6565

6666
- Clients that don't use modern authentication (for example, an Office 2010 client). Modern authentication encompasses clients that implement protocols, such as OAuth 2.0, to support features like multifactor authentication and smart cards. Legacy authentication typically only supports less secure mechanisms like passwords.
6767
- Client that uses mail protocols such as IMAP, SMTP, or POP3.
6868

69-
Today, the majority of compromising sign-in attempts come from legacy authentication. Legacy authentication does not support multifactor authentication. Even if you have a multifactor authentication policy enabled on your directory, an attacker can authenticate by using an older protocol and bypass multifactor authentication.
69+
Today, most compromising sign-in attempts come from legacy authentication. Legacy authentication doesn't support multifactor authentication. Even if you have a multifactor authentication policy enabled on your directory, an attacker can authenticate by using an older protocol and bypass multifactor authentication.
7070

7171
After security defaults are enabled in your tenant, all authentication requests made by an older protocol will be blocked. Security defaults blocks Exchange Active Sync basic authentication.

learn-pr/wwl-sci/plan-implement-administer-conditional-access/index.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ metadata:
44
adobe-target: true
55
prefetch-feature-rollout: true
66
title: Plan, Implement, and Administer Conditional Access
7-
description: "Conditional Access gives a fine granularity of control over which users and identities can do specific activities, access which resources, and how to ensure data and systems are safeincluding AI agent identities managed through Microsoft Entra Agent ID."
7+
description: "Conditional Access gives a fine granularity of control over which users and identities can do specific activities, access which resources, and how to ensure data and systems are safeincluding AI agent identities managed through Microsoft Entra Agent ID."
88
ms.date: 06/27/2025
99
author: r-c-stewart
1010
ms.author: roberts
@@ -15,9 +15,9 @@ metadata:
1515
ms.service: azure
1616
ai-usage: ai-assisted
1717
title: Plan, implement, and administer Conditional Access
18-
summary: Conditional Access gives a fine granularity of control over which users and identities can do specific activities, access which resources, and how to ensure data and systems are safeincluding AI agent identities managed through Microsoft Entra Agent ID.
18+
summary: Conditional Access gives a fine granularity of control over which users and identities can do specific activities, access which resources, and how to ensure data and systems are safeincluding AI agent identities managed through Microsoft Entra Agent ID.
1919
abstract: |
20-
By the end of this module, you will be able to:
20+
By the end of this module, you can:
2121
2222
- Plan and implement security defaults.
2323

0 commit comments

Comments
 (0)