Skip to content

Commit

Permalink
Merge pull request #6326 from MicrosoftDocs/MicrosoftGuyJFlo-patch-93
Browse files Browse the repository at this point in the history
Update policy-all-users-device-registration.md
  • Loading branch information
prmerger-automator[bot] authored Dec 16, 2024
2 parents 3df76ca + 4d45e07 commit e1c2d69
Showing 1 changed file with 3 additions and 0 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -45,6 +45,7 @@ After administrators confirm the settings using [report-only mode](howto-conditi
>
> :::image type="content" source="media/policy-all-users-device-registration/device-settings-require-mfa-to-register-or-join.png" alt-text="Screenshot of the Require Multifactor Authentication to register or join devices with Microsoft Entra control to be disabled." lightbox="media/policy-all-users-device-registration/device-settings-require-mfa-to-register-or-join.png":::
<!---
### Block access to register or join devices outside of trusted networks and locations
Organizations might choose to incorporate known network locations known as **Named locations** in their Conditional Access policies. These named locations might include trusted IP networks like those for a main office location. For more information about configuring named locations, see the article [What is the location condition in Microsoft Entra Conditional Access?](concept-assignment-network.md#ipv4-and-ipv6-address-ranges)
Expand All @@ -67,6 +68,8 @@ Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at
1. Confirm your settings and set **Enable policy** to **Report-only**.
1. Select **Create** to create to enable your policy.
--->

## Related content

- [Conditional Access authentication strength](../authentication/concept-authentication-strengths.md)
Expand Down

0 comments on commit e1c2d69

Please sign in to comment.