Skip to content

Commit 3eb506b

Browse files
authored
Merge pull request #28737 from MicrosoftDocs/deniseb-sfistuff
SFI -- Global Admin fixes
2 parents 31b37d6 + a5defe5 commit 3eb506b

10 files changed

Lines changed: 63 additions & 43 deletions

microsoft-365/enterprise/PortalLaunchScheduler.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -181,6 +181,9 @@ The SharePoint Portal launch scheduler tool was originally only available via [S
181181
182182
1. Connect to SharePoint as a [global admin or SharePoint admin](/sharepoint/sharepoint-admin-role) in Microsoft 365. To learn how, see [Getting started with SharePoint Management Shell](/powershell/sharepoint/sharepoint-online/connect-sharepoint-online).
183183

184+
> [!IMPORTANT]
185+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
186+
184187
### View any existing portal launch setups
185188

186189
To see if there are existing portal launch configurations:

microsoft-365/enterprise/cross-tenant-onedrive-migration-step6.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -29,8 +29,8 @@ This article is Step 6 in a solution designed to complete a Cross-tenant OneDriv
2929
- **Step 6: [Start a Cross-tenant OneDrive migration](cross-tenant-onedrive-migration-step6.md)**
3030
- Step 7: [Post migration steps](cross-tenant-onedrive-migration-step7.md)
3131

32-
>[!IMPORTANT]
33-
>Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
32+
> [!IMPORTANT]
33+
> Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
3434
3535
Now you're ready to start your OneDrive migration. Before starting any cross-tenant migration, do the following steps.
3636

@@ -127,7 +127,7 @@ Example:
127127
Get-SPOUserAndContentMoveState -PartnerCrossTenantHostURL https://m365x946316-my.sharepoint.com -SourceUserPrincipalName [email protected]
128128
```
129129

130-
To get the status of the move based on a particular users UPN but with more information, use the *-Verbose* parameter.
130+
To get the status of the move based on a particular user's UPN but with more information, use the *-Verbose* parameter.
131131

132132
Example:
133133

microsoft-365/enterprise/cross-tenant-sharepoint-migration-step6.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,8 +18,8 @@ description: "Step 6 of the SharePoint site Cross-tenant migration feature"
1818
---
1919
# Step 6: Start a SharePoint site cross-tenant migration (preview)
2020

21-
>[!Note]
22-
>Cross-Tenant SharePoint migration is currently in a private preview stage of development. As an unfinished project, any information or availability is subject to change at any time. Support for private-preview customers will be handled via email. Cross-Tenant SharePoint migration is covered by the preview terms of the [Microsoft Universal License Terms for Online Services](https://www.microsoft.com/licensing/terms/product/ForOnlineServices/all).
21+
> [!NOTE]
22+
> Cross-Tenant SharePoint migration is currently in a private preview stage of development. As an unfinished project, any information or availability is subject to change at any time. Support for private-preview customers will be handled via email. Cross-Tenant SharePoint migration is covered by the preview terms of the [Microsoft Universal License Terms for Online Services](https://www.microsoft.com/licensing/terms/product/ForOnlineServices/all).
2323
2424
This is Step 6 in a solution designed to complete a Cross-tenant SharePoint migration. To learn more, see [Cross-tenant SharePoint migration overview](cross-tenant-SharePoint-migration.md).
2525

microsoft-365/enterprise/deploy-identity-solution-identity-model.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,6 @@ Here are the two types of identity and their best fit and benefits.
5858
| **How Microsoft 365 authenticates user credentials** | The Microsoft Entra tenant for your Microsoft 365 subscription performs the authentication with the cloud identity account. | The Microsoft Entra tenant for your Microsoft 365 subscription either handles the authentication process or redirects the user to another identity provider. |
5959
| **Best for** | Organizations that do not have or need an on-premises AD DS. | Organizations using AD DS or another identity provider. |
6060
| **Greatest benefit** | Simple to use. No extra directory tools or servers required. | Users can use the same credentials when accessing on-premises or cloud-based resources. |
61-
||||
6261

6362
## Cloud-only identity
6463

microsoft-365/enterprise/join-leave-multi-tenant-org.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,9 @@ To join a multitenant organization, a global administrator in the owner organiza
2222

2323
Once you've joined, you can leave a multitenant organization at any time.
2424

25+
> [!IMPORTANT]
26+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
27+
2528
<a name='related-settings-in-azure-ad'></a>
2629

2730
## Related settings in Microsoft Entra ID

microsoft-365/enterprise/m365-dr-workload-copilot.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,9 @@ Required Conditions:
5353
1. For existing _Tenant_ that has data stored in a _Macro Region Geography_, the _Tenant_ Global Admin must opt in to move the _Tenant_ data into the _Local Region Geography_.
5454
1. The Microsoft 365 Copilot subscription customer data is provisioned in _Local Region Geography_.
5555

56+
> [!IMPORTANT]
57+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
58+
5659
**Commitment:**
5760

5861
Refer to the [ADR Commitment page](m365-dr-commitments.md#microsoft-365-copilot) to understand the specific data at rest commitments for Microsoft 365 Copilot. Examples of the committed data include:

microsoft-365/enterprise/microsoft-365-secure-sign-in.md

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -59,6 +59,9 @@ MFA requires that user sign-ins be subject to an additional verification beyond
5959

6060
Your first step in using MFA is to [require it for all administrator accounts](protect-your-global-administrator-accounts.md), also known as privileged accounts. Beyond this first step, Microsoft recommends MFA For all users.
6161

62+
> [!IMPORTANT]
63+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
64+
6265
There are three ways to require your users to use MFA based on your Microsoft 365 plan.
6366

6467
| Plan | Recommendation |
@@ -107,8 +110,8 @@ This table shows the results of enabling MFA with security defaults and Conditio
107110

108111
| Method | Enabled | Disabled | Additional authentication method |
109112
|:-------|:-----|:-------|:-------|
110-
| **Security defaults** | Cant use Conditional Access policies | Can use Conditional Access policies | Microsoft Authenticator app |
111-
| **Conditional Access policies** | If any are enabled, you cant enable security defaults | If all are disabled, you can enable security defaults | User specifies during MFA registration |
113+
| **Security defaults** | Can't use Conditional Access policies | Can use Conditional Access policies | Microsoft Authenticator app |
114+
| **Conditional Access policies** | If any are enabled, you can't enable security defaults | If all are disabled, you can enable security defaults | User specifies during MFA registration |
112115
||||
113116

114117
## Zero Trust identity and device access configurations
@@ -133,14 +136,14 @@ Microsoft highly recommends configuring and rolling out Zero Trust identity and
133136

134137
## Microsoft Entra ID Protection
135138

136-
In this section, you'll learn how to configure policies that protect against credential compromise, where an attacker determines a users account name and password to gain access to an organizations cloud services and data. Microsoft Entra ID Protection provides a number of ways to help prevent an attacker from compromising a user account's credentials.
139+
In this section, you'll learn how to configure policies that protect against credential compromise, where an attacker determines a user's account name and password to gain access to an organization's cloud services and data. Microsoft Entra ID Protection provides a number of ways to help prevent an attacker from compromising a user account's credentials.
137140

138141
With Microsoft Entra ID Protection, you can:
139142

140143
|Capability|Description|
141144
|:---------|:---------|
142-
| Determine and address potential vulnerabilities in your organizations identities | Microsoft Entra ID uses machine learning to detect anomalies and suspicious activity, such as sign-ins and post-sign-in activities. Using this data, Microsoft Entra ID Protection generates reports and alerts that help you evaluate the issues and take action.|
143-
|Detect suspicious actions that are related to your organizations identities and respond to them automatically|You can configure risk-based policies that automatically respond to detected issues when a specified risk level has been reached. These policies, in addition to other Conditional Access controls provided by Microsoft Entra ID and Microsoft Intune, can either automatically block access or take corrective actions, including password resets and requiring Microsoft Entra multifactor authentication for subsequent sign-ins. |
145+
| Determine and address potential vulnerabilities in your organization's identities | Microsoft Entra ID uses machine learning to detect anomalies and suspicious activity, such as sign-ins and post-sign-in activities. Using this data, Microsoft Entra ID Protection generates reports and alerts that help you evaluate the issues and take action.|
146+
|Detect suspicious actions that are related to your organization's identities and respond to them automatically|You can configure risk-based policies that automatically respond to detected issues when a specified risk level has been reached. These policies, in addition to other Conditional Access controls provided by Microsoft Entra ID and Microsoft Intune, can either automatically block access or take corrective actions, including password resets and requiring Microsoft Entra multifactor authentication for subsequent sign-ins. |
144147
| Investigate suspicious incidents and resolve them with administrative actions | You can investigate risk events using information about the security incident. Basic workflows are available to track investigations and initiate remediation actions, such as password resets. |
145148
|||
146149

0 commit comments

Comments
 (0)