{ "InstallContextType": { "device": "Device", "deviceContext": "Device context", "user": "User", "userContext": "User context" }, "WipPolicySettings": { "addNetworkBoundary": "Add network boundary", "addNetworkBoundaryButton": "Add network boundary...", "allowWindowsSearch": "Allow Windows Search to search encrypted corporate data and Store apps", "authoritativeIpRanges": "Enterprise IP Ranges list is authoritative (do not auto-detect)", "authoritativeProxyServers": "Enterprise Proxy Servers list is authoritative (do not auto-detect)", "boundaryType": "Boundary type", "cloudResources": "Cloud resources", "corporateIdentity": "Corporate identity", "dataRecoveryCert": "Upload a Data Recovery Agent (DRA) certificate to allow recovery of encrypted data", "editNetworkBoundary": "Edit network boundary", "enrollmentState": "Enrollment state", "iPv4Ranges": "IPv4 ranges", "iPv6Ranges": "IPv6 ranges", "internalProxyServers": "Internal proxy servers", "maxInactivityTime": "Maximum amount of time (in minutes) allowed after the device is idle that will cause the device to become PIN or password locked", "maxPasswordAttempts": "Number of authentication failures allowed before the device will be wiped", "mdmDiscoveryUrl": "MDM discovery URL", "mdmRequiredSettingsInfo": "This policy only applies to Windows 10 Anniversary Edition and higher. This policy uses Windows Information Protection (WIP) to apply protection.", "minimumPinLength": "Set the minimum number of characters required for the PIN", "name": "Name", "networkBoundariesGridEmptyText": "Any network boundaries you add will show up here", "networkBoundary": "Network boundary", "networkDomainNames": "Network domains", "neutralResources": "Neutral resources", "passportForWork": "Use Windows Hello for Business as a method for signing into Windows", "pinExpiration": "Specify the period of time (in days) that a PIN can be used before the system requires the user to change it", "pinHistory": "Specify the number of past PINs that can be associated to a user account that can’t be reused", "pinLowercaseLetters": "Configure the use of lowercase letters in the Windows Hello for Business PIN", "pinSpecialCharacters": "Configure the use of special characters in the Windows Hello for Business PIN", "pinUppercaseLetters": "Configure the use of uppercase letters in the Windows Hello for Business PIN", "protectUnderLock": "Prevent corporate data from being accessed by apps when the device is locked. Applies only to Windows 10 Mobile", "protectedDomainNames": "Protected domains", "proxyServers": "Proxy servers", "requireAppPin": "Disable app PIN when device PIN is managed", "requiredSettings": "Required settings", "requiredSettingsInfo": "Changing the scope or removing this policy will decrypt corporate data.", "revokeOnMdmHandoff": "Revoke access to protected data when the device enrolls to MDM", "revokeOnUnenroll": "Revoke encryption keys on unenroll", "rmsTemplateForEdp": "Specify the template ID to use for Azure RMS", "showWipIcon": "Show the enterprise data protection icon", "type": "Type", "useRmsForWip": "Use Azure RMS for WIP", "value": "Value", "weRequiredSettingsInfo": "This policy only applies to Windows 10 Creators Update and higher. This policy uses Windows Information Protection (WIP) and Windows MAM to apply protection.", "wipProtectionMode": "Windows Information Protection mode", "withEnrollment": "With enrollment", "withoutEnrollment": "Without enrollment" }, "EdgeAppConfig": { "AllowedURLs": { "title": "Allowed URLs", "tooltip": "Specify the sites your users are allowed to access while in their work context. No other sites will be allowed. You may choose to configure either an allowed/blocked list, but not both. ​" }, "ApplicationProxyRedirection": { "header": "Application proxy", "title": "Application proxy redirection", "tooltip": "Enable App proxy redirection to give users access to corporate links and on-premise web apps." }, "BlockedURLs": { "title": "Blocked URLs", "tooltip": "Specify the sites that are blocked for your users while in their work context. All other sites will be allowed. You may choose to configure either an allowed/blocked list, but not both. " }, "Bookmarks": { "header": "Managed bookmarks", "tooltip": "Enter a list of bookmarked URLs for your users to have available when using Microsoft Edge in their work context.​", "uRL": "URL" }, "HomepageURL": { "header": "Managed homepage", "title": "Homepage shortcut URL", "tooltip": "Configure a homepage shortcut that will appear to users as the first icon beneath the search bar when they open a new tab in Microsoft Edge.​" }, "PersonalContext": { "label": "Redirect restricted sites to personal context", "tooltip": "Configure if users should be allowed to transition to their personal context to open restricted sites." } }, "AzureIAM": { "AdrsUserActionSelectionWarning": { "conditions": "Conditions that require device registration are not available with \"Register or join devices\" user action.", "message": "Only \"Require multi-factor authentication\" can be used in policies created for the \"Register or join devices\" user action.{0}" }, "AuthContext": { "Included": { "none": "No cloud apps, actions, or authentication contexts selected", "plural": "{0} authentication contexts included", "singular": "1 authentication context included" }, "InfoBlade": { "createTitle": "Add authentication context", "descPlaceholder": "Add description for the authentication context", "modifyTitle": "Modify authentication context", "namePlaceholder": "Ex. Trusted location, Trusted device, Strong authorization", "publishDesc": "Publish to apps will make the authentication context available for apps to use. Publish once you finish configuring Conditional Access policy for the tag. [Learn more][1]\n[1]: https://go.microsoft.com/fwlink/?linkid=2150966", "publishLabel": "Publish to apps", "titleDesc": "Configure an authentication context that will be used to protect application data and actions. Use names and descriptions that can be understood by application administrators. [Learn more][1]\n[1]:https://go.microsoft.com/fwlink/?linkid=2150965" }, "Notify": { "failure": "Failed to update {0}", "modifying": "Modifying {0}", "success": "Successfully updated {0}" }, "WhatIf": { "selected": "Authentication context included" }, "addNewStepUp": "New authentication context", "checkBoxInfo": "Select the authentication contexts this policy will apply to", "configure": "Configure authentication contexts", "createCA": "Assign Conditional Access policies to the authentication context", "dataGrid": "List of authentication contexts", "description": "Description", "documentation": "Documentation", "getStarted": "Get started", "label": "Authentication context (preview)", "menuLabel": "Authentication context (Preview)", "name": "Name", "noAuthContextSet": "There are no authentication contexts", "noData": "No authentication contexts to display", "selectionInfo": "Authentication context is used to secure application data and actions in apps like SharePoint and Microsoft Cloud App Security.", "step": "Step", "tabDescription": "Manage authentication context to protect data and actions in your apps. [Learn more][1]\n[1]:https://go.microsoft.com/fwlink/?linkid=2150965", "tagResources": "Tag resources with an authentication context" }, "AuthenticationStrength": { "Mode": { "deviceBasedPush": "Microsoft Authenticator (Phone Sign-in)", "deviceBasedPushFido2X509Certificate": "Microsoft Authenticator (Phone Sign-in) + Fido 2 + Certificate Based Authentication", "deviceBasedPushX509CertificateSingleFactor": "Microsoft Authenticator (Phone Sign-in) + Fido 2 + Certificate Based Authentication (Single Factor)", "email": "Email One Time Pass", "emailOtp": "Email OTP", "federatedMultiFactor": "Federated Multi-Factor", "federatedSingleFactor": "Federated single factor", "federatedSingleFactorFederatedMultiFactor": "Federated single factor + Federated Multi-Factor", "fido2": "FIDO 2 security key", "fido2X509CertificateSingleFactor": "FIDO 2 security key + Certificate Based Authentication (Single Factor)", "hardwareOath": "Hardware OTP", "hardwareOathX509CertificateSingleFactor": "Hardware OTP + Certificate Based Authentication (Single Factor)", "microsoftAuthenticatorPSIX509CertificateSingleFactor": "Microsoft Authenticator (Phone Sign-in) + Certificate Based Authentication (Single Factor)", "microsoftAuthenticatorPsi": "Microsoft Authenticator (Phone Sign-in)", "microsoftAuthenticatorPush": "Microsoft Authenticator (Push Notification)", "microsoftAuthenticatorPushX509CertificateSingleFactor": "Microsoft Authenticator (Push Notification) + Certificate Based Authentication (Single Factor)", "none": "None", "password": "Password", "passwordDeviceBasedPush": "Password + Microsoft Authenticator (Phone Sign-in)", "passwordFido2": "Password + FIDO 2 security key", "passwordHardwareOath": "Password + Hardware OTP", "passwordMicrosoftAuthenticatorPSI": "Password + Microsoft Authenticator (Phone Sign-in)", "passwordMicrosoftAuthenticatorPush": "Password + Microsoft Authenticator (Push Notification)", "passwordSms": "Password + SMS", "passwordSoftwareOath": "Password + Software OTP", "passwordTemporaryAccessPassMultiUse": "Password + Temporary Access Pass (Multi-use)", "passwordTemporaryAccessPassOneTime": "Password + Temporary Access Pass (One-time use)", "passwordVoice": "Password + Voice", "sms": "SMS", "smsSignIn": "SMS sign in", "smsX509CertificateSingleFactor": "SMS + Certificate Based Authentication (Single Factor)", "softwareOath": "Software OTP", "softwareOathX509CertificateSingleFactor": "Software OTP + Certificate Based Authentication (Single Factor)", "temporaryAccessPassMultiUse": "Temporary Access Pass (Multi-use)", "temporaryAccessPassMultiUseX509CertificateSingleFactor": "Temporary Access Pass (Multi-use) + Certificate Based Authentication (Single Factor)", "temporaryAccessPassOneTime": "Temporary Access Pass (One-time use)", "temporaryAccessPassOneTimeX509CertificateSingleFactor": "Temporary Access Pass (One-time use) + Certificate Based Authentication (Single Factor)", "voice": "Voice", "voiceX509CertificateSingleFactor": "Voice + Certificate Based Authentication (Single Factor)", "windowsHelloForBusiness": "Windows Hello For Business", "x509CertificateMultiFactor": "Certificate Based Authentication (Multi-Factor)", "x509CertificateSingleFactor": "Certificate Based Authentication (Single Factor)" } }, "CAS": { "BuiltinPolicy": { "Option": { "blockDownloads": "Block downloads (Preview)", "monitorOnly": "Monitor only (Preview)", "protectDownloads": "Protect downloads (Preview)", "useCustomControls": "Use custom policy..." }, "ariaLabel": "Choose the kind of Conditional Access App Control to apply" } }, "ChooseApplications": { "Grid": { "appIdAria": "App ID: {0}" }, "LowerGrid": { "ariaLabel": "List of selected cloud apps" }, "UpperGrid": { "ariaLabel": "List of cloud apps which match the search term" } }, "ChooseLocations": { "Validation": { "failed": "With \"Selected locations\" you must choose at least one location.", "selector": "Choose at least one location" } }, "ClientApp": { "Clients": { "Validation": { "failed": "You must select at least one of the following clients" } } }, "ClientConditionsInfo": { "browserAndModern": "This policy only applies to browser and modern authentication apps. To apply the policy to all client apps, enable the client app condition and select all the client apps.", "classicExperience": "Since this policy was created, the default client apps configuration has been updated.", "legacyAuth": "When not configured, policies now apply to all client apps, including modern and legacy auth." }, "CloudAppFilterBlade": { "AssignmentFilter": { "header": "Attribute", "placeholder": "Choose an attribute" }, "Configure": { "infoBalloon": "Configure app filters you want to policy to apply to." }, "NoPermissions": { "learnMoreAria": "More about custom security attribute permissions.", "message": "You do not have the permissions needed to use custom security attributes." }, "gridHeader": "Using custom security attributes you can use the rule builder or rule syntax text box to create or edit the filter rules. In the preview, only attributes of type String are supported. Attributes of type Integer or Boolean will not be shown.", "learnMoreAria": "More information about using the rule builder and syntax text box.", "noAttributes": "There are no custom attributes available to filter on. You will need to configure some attributes to employ this filter.", "title": "Edit filter (Preview)" }, "CloudAppsUserActions": { "any": "Any cloud app or action", "infoBalloon": "Cloud app or user action you want to test. For example, 'SharePoint Online'", "learnMore": "Control access based on all or specific cloud apps or actions.", "learnMoreB2C": "Control access based on all or specific cloud apps.", "title": "Cloud apps or actions" }, "CloudappsSelectionBlade": { "Excluded": { "gridAria": "List of excluded cloud apps" }, "Filter": { "configured": "Configured", "label": "Edit filter (Preview)", "with": "{0} with {1}" }, "Included": { "gridAria": "List of included cloud apps" }, "Validation": { "authContext": "With \"authentication context\" you must configure at least one sub-item.", "selectApps": "\"{0}\" must be configured", "selector": "Select at least one app.", "userActions": "With \"User actions\" you must configure at least one sub-item." } }, "DeviceState": { "LearnMore": { "message": "Control user access when the device the user is signing-in from is not \"Hybrid Azure AD joined\" or \"marked as compliant\".\n '{0}' has been deprecated. Use '{1}' instead." } }, "Errors": { "notFound": "The policy was not found or has been deleted.", "notFoundDetailed": "The policy \"{0}\" no longer exists. It may have been deleted." }, "NamedLocation": { "Form": { "CountryLookup": { "ariaLabel": "Country lookup method", "gps": "Determine location by GPS coordinates", "info": "When the location condition of a Conditional Access policy is configured, users will be prompted by the Authenticator app to share their GPS location. ", "ip": "Determine location by IP address (IPv4 only)" }, "Header": { "new": "New location ({0})", "update": "Update location ({0})" }, "IP": { "learn": "Configure named location IPv4 and IPv6 ranges.\n[Learn more][1]\n[1]: https://go.microsoft.com/fwlink/?linkid=2084753" }, "Include": { "infoBalloon": "Unknown countries/regions are IP addresses that are not associated with a specific country or region. [Learn more][1]\n\nThis includes:\n* IPv6 addresses\n* IPv4 addresses without a direct mapping\n[1]: https://aka.ms/canamedlocations\n", "label": "Include unknown countries/regions" }, "Name": { "empty": "Name cannot be empty", "placeholder": "Name this location" }, "PrivateLink": { "learn": "Create a new named location containing Private Links for Azure AD.\n[Learn more][1]\n[1]: https://go.microsoft.com/fwlink/?linkid=2084753" }, "Search": { "countries": "Search countries", "names": "Search names", "privateLinks": "Search Private Links" }, "Trusted": { "label": "Mark as trusted location" }, "enter": "Enter a new IPv4 or IPv6 range", "example": "ex: 40.77.182.32/27 or 2a01:111::/32" }, "Label": { "addCountries": "Countries location", "addIpRange": "IP ranges location", "addPrivateLink": "Azure Private Links" }, "Notification": { "Create": { "Failed": { "description": "Failure in creating new location ({0})", "title": "Creation has failed" }, "InProgress": { "description": "Creating new location ({0})", "title": "Creation in progress" }, "Success": { "description": "Success in creating new location ({0})", "title": "Creation has succeeded" } }, "Delete": { "Failed": { "description": "Failure in deleting location ({0})", "title": "Deletion has failed" }, "InProgress": { "description": "Deleting location ({0})", "title": "Deletion in progress" }, "Success": { "description": "Success in deleting location ({0})", "title": "Deletion has succeeded" } }, "Update": { "Failed": { "description": "Failure in updating location ({0})", "title": "Updating has failed" }, "InProgress": { "description": "Updating location ({0})", "title": "Updating in progress" }, "Success": { "description": "Success in updating location ({0})", "title": "Updating has succeeded" } } }, "PrivateLinks": { "grid": "List of Private Links" }, "Trusted": { "title": "Trusted type", "trusted": "Trusted" }, "Type": { "all": "All types", "countries": "Countries", "ipRanges": "IP ranges", "privateLinks": "Private Links", "title": "Location type" }, "iPRangeInvalidError": "Value must be a valid IPv4 or IPv6 range.", "iPRangeLinkOrSiteLocalError": "IP network detected as a link local or site local address.", "iPRangeOctetError": "IP network must not start with 0 or 255.", "iPRangePrefixError": "IP network prefix must be from /{0} to /{1}.", "iPRangePrivateError": "IP network detected as a private address." }, "Policies": { "Grid": { "aria": "List of Conditional Access policies" }, "countText": "{0} out of {1} policies found", "countTextSingular": "{0} out of 1 policy found", "search": "Search policies" }, "Policy": { "Condition": { "ServicePrincipalRisk": { "description": "Configure service principal risk levels needed for policy to be enforced​", "infoBalloonContent": "Configure service principal risk to apply the policy to selected risk level(s)", "title": "Service principal risk" } } }, "PolicyControlAuthStrength": { "MultiFactorAuthentication": { "description": "Combinations of methods that satisfy strong authentication, such as Password + SMS", "displayName": "Multi-factor authentication (MFA)" }, "Passwordless": { "description": "Passwordless methods that satisfy strong authentication, such as Microsoft Authenticator ", "displayName": "Passwordless MFA" }, "PhishingResistant": { "description": "Phishing-resistant Passwordless methods for the strongest authentication, such as FIDO2 Security Key", "displayName": "Phishing resistant MFA" } }, "PolicyControlFedAuthMethod": { "certificate": "Certificate authentication", "infoBubble": "Specify a required authentication method, that must be satisfied by federation provider, such as ADFS.", "multifactor": "Multi-factor authentication", "require": "Require federated authentication method (Preview)", "whatIfFormat": "{0} - {1}" }, "PolicyState": { "off": "Off", "on": "On", "reportOnly": "Report-only" }, "PolicyTemplates": { "Devices": { "description": "Select Devices policy template category to gain visibility into devices accessing the network. Ensure compliance and health status before granting access.", "name": "Devices" }, "Identities": { "description": "Select Identities policy template category to verify and secure each identity with strong authentication across your entire digital estate.", "name": "Identities" }, "Summary": { "CloudApps": { "allCloudApps": "All apps", "office365": "Office 365", "registerSecurityInfo": "Register security information" }, "Conditions": { "androidAndIOS": "Device Platform: Android and IOS", "anyDevice": "Any device except Android, IOS, Windows and Mac", "anyDeviceStateExceptHybrid": "Any device state except compliant and hybrid Azure AD joined", "anyLocation": "Any location except trusted", "browserMobileDesktop": "Client apps: Browser, Mobile apps and desktop clients", "exchangeActiveSync": "Client Apps: Exchange Active Sync, Other Clients", "windowsAndMac": "Device Platform: Windows and Mac" }, "Devices": { "anyDevice": "Any Device" }, "Grant": { "appProtectionPolicy": "Require app protection policy", "approvedClientApp": "Require approved client app", "blockAccess": "Block access", "mfa": "Require multi-factor authentication", "passwordChange": "Require password change", "requireCompliantDevice": "Require device to be marked as compliant", "requireHybridAzureADDevice": "Require hybrid Azure AD joined device" }, "Session": { "appEnforcedRestrictions": "Use app enforced restrictions", "signInFrequency": "Sign-in Frequency and never persistent browser session" }, "UsersAndGroups": { "allUsers": "All Users", "directoryRoles": "Directory roles except current administrator", "globalAdmin": "Global Administrator", "noGuestAndAdmins": "All Users except Guest and External, Global administrators, Current administrator" }, "azureManagement": "Azure Management", "deviceFilters": "Filters for devices", "devicePlatforms": "Device Platforms" }, "TemplateId": { "AppEnforcedRestrictions": { "description": "Block or limit access to SharePoint, OneDrive, and Exchange content from unmanaged devices.", "name": "CA014: Use application enforced restrictions for unmanaged devices", "title": "Use application enforced restrictions for unmanaged devices" }, "ApprovedClientApps": { "description": "To prevent data loss, organizations can restrict access to approved modern auth client apps with Intune app protection.", "name": "CA012: Require approved client apps and app protection", "title": "Require approved client apps and app protection" }, "BlockAccessOnUnknowns": { "description": "Users will be blocked from accessing company resources when the device type is unknown or unsupported.", "name": "CA010: Block access for unknown or unsupported device platform", "title": "Block access for unknown or unsupported device platform" }, "BlockLegacyAuth": { "description": "Block legacy authentication endpoints that can be used to bypass multi-factor authentication. ", "name": "CA003: Block legacy authentication", "title": "Block legacy authentication" }, "NoPersistentBrowserSession": { "description": "Protect user access on unmanaged devices by preventing browser sessions from remaining signed in after the browser is closed and setting a sign-in frequency to 1 hour.", "name": "CA011: No persistent browser session", "title": "No persistent browser session" }, "RequireCompliantOrHybridADAdmins": { "description": "Require privileged administrators to only access resources when using a compliant or hybrid Azure AD joined device.​", "name": "CA009: Require compliant or hybrid Azure AD joined device for admins", "title": "Require compliant or hybrid Azure AD joined device for admins" }, "RequireCompliantOrHybridADAllUsers": { "description": "Protect access to company resources by requiring users to use a managed device or perform multi-factor authentication. (macOS or Windows only)", "name": "CA013: Require compliant or hybrid Azure AD joined device or multi-factor authentication for all users", "title": "Require compliant or hybrid Azure AD joined device or multi-factor authentication for all users" }, "RequireMFAAllUsers": { "description": "Require multi-factor authentication for all user accounts to reduce risk of compromise.", "name": "CA004: Require multi-factor authentication for all users", "title": "Require multi-factor authentication for all users" }, "RequireMFAForAdmins": { "description": "Require multi-factor authentication for privileged administrative accounts to reduce risk of compromise. This policy will target the same roles as Security Default.", "name": "CA001: Require multi-factor authentication for admins", "title": "Require multi-factor authentication for admins" }, "RequireMFAForAzureManagement": { "description": "Require multi-factor authentication to protect privileged access to Azure resources.", "name": "CA006: Require multi-factor authentication for Azure management", "title": "Require multi-factor authentication for Azure management" }, "RequireMFAForGuestAccess": { "description": "Require guest users perform multi-factor authentication when accessing your company resources.", "name": "CA005: Require multi-factor authentication for guest access", "title": "Require multi-factor authentication for guest access" }, "RequireMFAForRiskySignIn": { "description": "Require multi-factor authentication if the sign-in risk is detected to be medium or high. (Requires an Azure AD Premium 2 License)", "name": "CA007: Require multi-factor authentication for risky sign-ins", "title": "Require multi-factor authentication for risky sign-ins" }, "RequirePasswordChangeForHighRiskUsers": { "description": "Require the user to change their password if the user risk is detected to be high. (Requires an Azure AD Premium 2 License)", "name": "CA008: Require password change for high-risk users", "title": "Require password change for high-risk users" }, "RequireSecurityInfo": { "description": "Secure when and how users register for Azure AD multi-factor authentication and self-service password. ", "name": "CA002: Securing security info registration", "title": "Securing security info registration" } }, "TemplateState": { "BlockAccessOnUnknowns": { "title": "Enabling this policy will prevent any access from unknown device type, consider using report only mode to begin with until you have confirmed this will not impact your users." }, "BlockLegacyAuth": { "description": "Consider using report only mode to begin with until you have confirmed this will not impact your users.", "title": "Enabling this policy will block legacy authentication for all your users." }, "RequireCompliantOrHybridADAdmins": { "Description": { "on": "Consider using report only mode to begin with until you have confirmed this will not impact your privileged users.", "reportOnly": "Policies in report-only mode that require compliant devices may prompt users on Mac, iOS, and Android to select a device certificate during policy evaluation, even though device compliance is not enforced. These prompts may repeat until the device is made compliant." }, "Title": { "on": "Enabling this policy will prevent any access for privileged users unless using a managed device such as compliant or hybrid Azure AD joined. Ensure you have configured your compliance policies or enabled hybrid Azure AD configuration before enabling.", "reportOnly": "Ensure you have configured your compliance policies or enabled hybrid Azure AD configuration before enabling. " } }, "RequireCompliantOrHybridADAllUsers": { "Description": { "on": "This policy will affect all users except the current logged in Administrator. Consider using report only mode to begin with until you have confirmed this will not impact your users." }, "Title": { "on": "Don't lock yourself out! Make sure that your device is compliant, or hybrid Azure AD Joined or you have configured multi-factor authentication. ", "reportOnly": "Policies in report-only mode that require compliant devices may prompt users on Mac, iOS, and Android to select a device certificate during policy evaluation, even though device compliance is not enforced. These prompts may repeat untli the device is made compliant." } }, "RequireMfa": { "description": "If you use emergency access accounts or Azure AD connect to synchronize your on-premises objects, you may need to exclude these accounts from this policy after creation." }, "RequireMfaAdmins": { "description": "Please note the current administrator account will automatically be excluded but all others will be protected on policy creation. Consider using report only mode to begin with.", "title": "Don't lock yourself out! This policy impacts the Azure portal." }, "RequireMfaAllUsers": { "description": "Consider using report only mode to begin with until you have planned and communicated this change to all your users.", "title": "Enabling this policy will enforce multi-factor authentication for all your users." }, "RequireSecurityInfo": { "description": "Please ensure you review your configuration to protect these accounts based on your company needs.", "title": "The following users and roles are excluded from this policy, Guests and External Users, Global Administrators, Current Administrator" } }, "basics": "Basics", "clientApps": "Client apps", "cloudApps": "Cloud apps", "cloudAppsOrActions": "Cloud apps or actions ", "conditions": "Conditions ", "createNewPolicy": "Create new policy from templates (Preview)", "createPolicy": "Create Policy", "currentUser": "Current user", "customizeBuild": "Customize your build", "customizeTemplate": "Template lists are customized based on the type of policy you're looking to create", "excludedDevicePlatform": "Excluded device platforms", "excludedDirectoryRoles": "Excluded directory roles", "excludedLocation": "Excluded directory roles", "excludedUsers": "Excluded users", "grantControl": "Grant control ", "includeFilteredDevice": "Include filtered devices in policy", "includedDevicePlatform": "Included device platforms", "includedDirectoryRoles": "Included directory roles", "includedLocation": "Included location", "includedUsers": "Included users", "legacyAuthenticationClients": "Legacy authentication clients", "namePolicy": "Name your policy", "next": "Next", "policyName": "Policy Name", "policyState": "Policy state", "policySummary": "Policy summary", "policyTemplate": "Policy template", "previous": "Previous", "reviewAndCreate": "Review + create", "riskLevels": "Risk levels", "selectATemplate": "Select a Template", "selectTemplate": "Select template", "selectTemplateCategory": "Select a template category", "selectTemplateRecommendation": "We recommend the following templates based on your response", "sessionControl": "Session control ", "signInFrequency": "Sign-in frequency", "signInRisk": "Sign-in risk", "template": "Template ", "templateCategory": "Template category", "userRisk": "User risk", "usersAndGroups": "Users and groups ", "viewPolicySummary": "View policy summary " }, "SSM": { "MemberSelector": { "description": "Users and groups" }, "Notification": { "Migration": { "error": "Failed to migrate Continuous access evaluation settings to Conditional access policies", "inProgress": "Migrating Continuous access evaluation settings", "success": "Successfully migrated Continuous access evaluation settings to Conditional access policies", "successDescription": "Please proceed to Conditional access policies to view the migrated settings in the newly created policy named \"CA policy created from CAE settings\"." }, "error": "Failed to update Continuous access evaluation settings", "inProgress": "Updating Continuous access evaluation settings", "success": "Successfully updated Continuous access evaluation settings" }, "PreviewOptions": { "disable": "Disable preview", "enable": "Enable preview" }, "StrictLocationEnforcement": { "infoContent1": "Different IPs can be seen by Azure AD and Resource Provider from the same client device due to network partition or IPv4/IPv6 mismatch. Strict Location Enforcement will enforce the Conditional Access policy based on both IP addresses seen by Azure AD and Resource Provider.", "infoContent2": "To ensure maximum security, it is recommended to include all IPs that can be seen by both Azure AD and Resource Provider in your Named Location policy and turn on \"Strict Location Enforcement\" mode.", "label": "Strict Location Enforcement", "title": "Additional enforcement modes" }, "bladeTitle": "Continuous access evaluation", "description": "When a user's access is removed or a client IP address changes, Continuous access evaluation automatically blocks access to resources and applications in near real time. ", "migrateLabel": "Migrate", "migrationError": "Migration failed due to the following error: {0}", "migrationInfo": "CAE setting has been moved under Conditional Access UX, please migrate with the “Migrate” button above and configure it with Conditional Access policy going forward. Click here to learn more.", "noLicenseMessage": "Manage smart session management settings with Azure AD Premium", "optionsPickerTitle": "Enable/Disable Continuous access evaluation", "upsellInfo": "You cannot change your settings on this page anymore and any settings here should be disregarded. Your previous setting will be honored. You can configure your CAE settings under Conditional Access going forward. Click here to learn more." }, "SessionLifetime": { "PersistentBrowser": { "Error": { "notAllApps": "Persistent browser session policy only works correctly when \"All cloud apps\" is selected. Please update your cloud apps selection." }, "Option": { "always": "Always persistent", "help": "A persistent browser session allows users to remain signed in after closing and reopening their browser window.
\n