Skip to content

Commit 4091bd8

Browse files
Update baseline-security-mode-settings.md with important note
Added important note regarding draft Conditional Access policies created during Baseline Security Mode access.
1 parent 7b6c5b1 commit 4091bd8

1 file changed

Lines changed: 4 additions & 0 deletions

File tree

microsoft-365/baseline-security-mode/baseline-security-mode-settings.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -62,6 +62,10 @@ It's recommended that you run the Baseline security mode settings in this way:
6262

6363
This section outlines the options available to block insecure authentication methods in the Microsoft 365 admin center.
6464

65+
> [!IMPORTANT]
66+
> Customers who accessed Baseline Security Mode in Microsoft 365 between November 2025 and early February 2026 may see two draft Microsoft Entra ID Conditional Access policies created in their tenant in a "Disabled" state. These policies are associated with Baseline Security Mode and may appear as created by the administrator who signed in to the Microsoft Baseline Security Mode page.
67+
This behavior does not represent a security incident and has no impact on tenant security. The policies are in a disabled draft state. A fix is in progress to ensure policies are created only through explicit administrator action. Microsoft will remove any unintentionally created policy drafts and will notify customers in advance.
68+
6569
|Setting|More information|
6670
|---|---|
6771
|Protect admin access to Microsoft admin portals with phishing resistant authentication|Accounts that are assigned privileged administrative roles are frequent targets of attackers. Requiring phishing-resistant multifactor authentication (MFA) on those accounts is an easy way to reduce the risk of those accounts being compromised.<br/><br/> For more information, see [Require phishing-resistant multifactor authentication for administrators](/entra/identity/conditional-access/policy-admin-phish-resistant-mfa) <br/><br/> You must be a member of the [Security administrator](/entra/identity/role-based-access-control/permissions-reference) or the [Conditional access administrator](/entra/identity/role-based-access-control/permissions-reference) roles to perform this task.|

0 commit comments

Comments
 (0)