{ "InstallContextType": { "device": "Device", "deviceContext": "Device context", "user": "User", "userContext": "User context" }, "WipPolicySettings": { "addNetworkBoundary": "Add network boundary", "addNetworkBoundaryButton": "Add network boundary...", "allowWindowsSearch": "Allow Windows Search to search encrypted corporate data and Store apps", "authoritativeIpRanges": "Enterprise IP Ranges list is authoritative (do not auto-detect)", "authoritativeProxyServers": "Enterprise Proxy Servers list is authoritative (do not auto-detect)", "boundaryType": "Boundary type", "cloudResources": "Cloud resources", "corporateIdentity": "Corporate identity", "dataRecoveryCert": "Upload a Data Recovery Agent (DRA) certificate to allow recovery of encrypted data", "editNetworkBoundary": "Edit network boundary", "enrollmentState": "Enrollment state", "iPv4Ranges": "IPv4 ranges", "iPv6Ranges": "IPv6 ranges", "internalProxyServers": "Internal proxy servers", "maxInactivityTime": "Maximum amount of time (in minutes) allowed after the device is idle that will cause the device to become PIN or password locked", "maxPasswordAttempts": "Number of authentication failures allowed before the device will be wiped", "mdmDiscoveryUrl": "MDM discovery URL", "mdmRequiredSettingsInfo": "This policy only applies to Windows 10 Anniversary Edition and higher. This policy uses Windows Information Protection (WIP) to apply protection.", "minimumPinLength": "Set the minimum number of characters required for the PIN", "name": "Name", "networkBoundariesGridEmptyText": "Any network boundaries you add will show up here", "networkBoundary": "Network boundary", "networkDomainNames": "Network domains", "neutralResources": "Neutral resources", "passportForWork": "Use Windows Hello for Business as a method for signing into Windows", "pinExpiration": "Specify the period of time (in days) that a PIN can be used before the system requires the user to change it", "pinHistory": "Specify the number of past PINs that can be associated to a user account that can’t be reused", "pinLowercaseLetters": "Configure the use of lowercase letters in the Windows Hello for Business PIN", "pinSpecialCharacters": "Configure the use of special characters in the Windows Hello for Business PIN", "pinUppercaseLetters": "Configure the use of uppercase letters in the Windows Hello for Business PIN", "protectUnderLock": "Prevent corporate data from being accessed by apps when the device is locked. Applies only to Windows 10 Mobile", "protectedDomainNames": "Protected domains", "proxyServers": "Proxy servers", "requireAppPin": "Disable app PIN when device PIN is managed", "requiredSettings": "Required settings", "requiredSettingsInfo": "Changing the scope or removing this policy will decrypt corporate data.", "revokeOnMdmHandoff": "Revoke access to protected data when the device enrolls to MDM", "revokeOnUnenroll": "Revoke encryption keys on unenroll", "rmsTemplateForEdp": "Specify the template ID to use for Azure RMS", "showWipIcon": "Show the enterprise data protection icon", "type": "Type", "useRmsForWip": "Use Azure RMS for WIP", "value": "Value", "weRequiredSettingsInfo": "This policy only applies to Windows 10 Creators Update and higher. This policy uses Windows Information Protection (WIP) and Windows MAM to apply protection.", "wipProtectionMode": "Windows Information Protection mode", "withEnrollment": "With enrollment", "withoutEnrollment": "Without enrollment" }, "EdgeAppConfig": { "AllowedURLs": { "title": "Allowed URLs", "tooltip": "Specify the sites your users are allowed to access while in their work context. No other sites will be allowed. You may choose to configure either an allowed/blocked list, but not both. ​" }, "ApplicationProxyRedirection": { "header": "Application proxy", "title": "Application proxy redirection", "tooltip": "Enable App proxy redirection to give users access to corporate links and on-premise web apps." }, "BlockedURLs": { "title": "Blocked URLs", "tooltip": "Specify the sites that are blocked for your users while in their work context. All other sites will be allowed. You may choose to configure either an allowed/blocked list, but not both. " }, "Bookmarks": { "header": "Managed bookmarks", "tooltip": "Enter a list of bookmarked URLs for your users to have available when using Microsoft Edge in their work context.​", "uRL": "URL" }, "HomepageURL": { "header": "Managed homepage", "title": "Homepage shortcut URL", "tooltip": "Configure a homepage shortcut that will appear to users as the first icon beneath the search bar when they open a new tab in Microsoft Edge.​" }, "PersonalContext": { "label": "Redirect restricted sites to personal context", "tooltip": "Configure if users should be allowed to transition to their personal context to open restricted sites." } }, "AzureIAM": { "AdrsUserActionSelectionWarning": { "conditions": "Conditions that require device registration are not available with \"Register or join devices\" user action.", "message": "Only \"Require multi-factor authentication\" can be used in policies created for the \"Register or join devices\" user action.{0}" }, "AuthContext": { "Included": { "none": "No cloud apps, actions, or authentication contexts selected", "plural": "{0} authentication contexts included", "singular": "1 authentication context included" }, "InfoBlade": { "createTitle": "Add authentication context", "descPlaceholder": "Add description for the authentication context", "modifyTitle": "Modify authentication context", "namePlaceholder": "Ex. Trusted location, Trusted device, Strong authorization", "publishDesc": "Publish to apps will make the authentication context available for apps to use. Publish once you finish configuring Conditional Access policy for the tag. [Learn more][1]\n[1]: https://go.microsoft.com/fwlink/?linkid=2150966", "publishLabel": "Publish to apps", "titleDesc": "Configure an authentication context that will be used to protect application data and actions. Use names and descriptions that can be understood by application administrators. [Learn more][1]\n[1]:https://go.microsoft.com/fwlink/?linkid=2150965" }, "Notify": { "failure": "Failed to update {0}", "modifying": "Modifying {0}", "success": "Successfully updated {0}" }, "WhatIf": { "selected": "Authentication context included" }, "addNewStepUp": "New authentication context", "checkBoxInfo": "Select the authentication contexts this policy will apply to", "configure": "Configure authentication contexts", "createCA": "Assign Conditional Access policies to the authentication context", "dataGrid": "List of authentication contexts", "description": "Description", "documentation": "Documentation", "getStarted": "Get started", "label": "Authentication context (preview)", "menuLabel": "Authentication context (Preview)", "name": "Name", "noAuthContextSet": "There are no authentication contexts", "noData": "No authentication contexts to display", "selectionInfo": "Authentication context is used to secure application data and actions in apps like SharePoint and Microsoft Cloud App Security.", "step": "Step", "tabDescription": "Manage authentication context to protect data and actions in your apps. [Learn more][1]\n[1]:https://go.microsoft.com/fwlink/?linkid=2150965", "tagResources": "Tag resources with an authentication context" }, "CAS": { "BuiltinPolicy": { "Option": { "blockDownloads": "Block downloads (Preview)", "monitorOnly": "Monitor only (Preview)", "protectDownloads": "Protect downloads (Preview)", "useCustomControls": "Use custom policy..." }, "ariaLabel": "Choose the kind of Conditional Access App Control to apply" } }, "ChooseApplications": { "Grid": { "appIdAria": "App ID: {0}" }, "LowerGrid": { "ariaLabel": "List of selected cloud apps" }, "UpperGrid": { "ariaLabel": "List of cloud apps which match the search term" } }, "ChooseLocations": { "Validation": { "failed": "With \"Selected locations\" you must choose at least one location.", "selector": "Choose at least one location" } }, "ClientApp": { "Clients": { "Validation": { "failed": "You must select at least one of the following clients" } } }, "ClientConditionsInfo": { "browserAndModern": "This policy only applies to browser and modern authentication apps. To apply the policy to all client apps, enable the client app condition and select all the client apps.", "classicExperience": "Since this policy was created, the default client apps configuration has been updated.", "legacyAuth": "When not configured, policies now apply to all client apps, including modern and legacy auth." }, "CloudAppFilterBlade": { "AssignmentFilter": { "header": "Attribute", "placeholder": "Choose an attribute" }, "Configure": { "infoBalloon": "Configure app filters you want to policy to apply to." }, "gridHeader": "You can use the rule builder or rule syntax text box to create or edit a dynamic targeting rule.", "noAttributes": "There are no custom attributes available to filter on. You will need to configure some attributes to employ this filter.", "noPermissions": "You do not have permission to alter this filter; only to turn it off. To alter the filter you must also be a member of one of the following roles: {0}, {1}, or {2}.", "title": "Select dynamic targeting rule" }, "CloudAppsUserActions": { "any": "Any cloud app or action", "infoBalloon": "Cloud app or user action you want to test. For example, 'SharePoint Online'", "learnMore": "Control user access based on all or specific cloud apps or actions.", "learnMoreB2C": "Control user access based on all or specific cloud apps.", "title": "Cloud apps or actions" }, "CloudappsSelectionBlade": { "Excluded": { "gridAria": "List of excluded cloud apps" }, "Filter": { "configured": "Dynamic query configured", "label": "Dynamic targeting", "none": "No filter", "with": "{0} with {1}" }, "Included": { "gridAria": "List of included cloud apps" }, "Validation": { "authContext": "With \"authentication context\" you must configure at least one sub-item.", "selectApps": "With \"{0}\" you must select at least one app.", "selector": "Select at least one app.", "userActions": "With \"User actions\" you must configure at least one sub-item." } }, "DeviceState": { "LearnMore": { "message": "Control user access when the device the user is signing-in from is not \"Hybrid Azure AD joined\" or \"marked as compliant\"." } }, "Errors": { "notFound": "The policy was not found or has been deleted.", "notFoundDetailed": "The policy \"{0}\" no longer exists. It may have been deleted." }, "NamedLocation": { "Form": { "CountryLookup": { "ariaLabel": "Country lookup method", "gps": "Determine location by GPS coordinates (Preview)", "info": "When the location condition of a Conditional Access policy is configured, users will be prompted by the Authenticator app to share their GPS location. ", "ip": "Determine location by IP address (IPv4 only)" }, "Header": { "new": "New location ({0})", "update": "Update location ({0})" }, "IP": { "learn": "Configure named location IPv4 and IPv6 ranges.\n[Learn more][1]\n[1]: https://go.microsoft.com/fwlink/?linkid=2084753" }, "Include": { "infoBalloon": "Unknown countries/regions are IP addresses that are not associated with a specific country or region. [Learn more][1]\n\nThis includes:\n* IPv6 addresses\n* IPv4 addresses without a direct mapping\n[1]: https://aka.ms/canamedlocations\n", "label": "Include unknown countries/regions" }, "Name": { "empty": "Name cannot be empty", "placeholder": "Name this location" }, "PrivateLink": { "learn": "Create a new named location containing Private Links for Azure AD.\n[Learn more][1]\n[1]: https://go.microsoft.com/fwlink/?linkid=2084753" }, "Search": { "countries": "Search countries", "names": "Search names", "privateLinks": "Search Private Links" }, "Trusted": { "label": "Mark as trusted location" }, "enter": "Enter a new IPv4 or IPv6 range", "example": "ex: 40.77.182.32/27 or 2a01:111::/32" }, "Label": { "addCountries": "Countries location", "addIpRange": "IP ranges location", "addPrivateLink": "Azure Private Links" }, "Notification": { "Create": { "Failed": { "description": "Failure in creating new location ({0})", "title": "Creation has failed" }, "InProgress": { "description": "Creating new location ({0})", "title": "Creation in progress" }, "Success": { "description": "Success in creating new location ({0})", "title": "Creation has succeeded" } }, "Delete": { "Failed": { "description": "Failure in deleting location ({0})", "title": "Deletion has failed" }, "InProgress": { "description": "Deleting location ({0})", "title": "Deletion in progress" }, "Success": { "description": "Success in deleting location ({0})", "title": "Deletion has succeeded" } }, "Update": { "Failed": { "description": "Failure in updating location ({0})", "title": "Updating has failed" }, "InProgress": { "description": "Updating location ({0})", "title": "Updating in progress" }, "Success": { "description": "Success in updating location ({0})", "title": "Updating has succeeded" } } }, "PrivateLinks": { "grid": "List of Private Links" }, "Trusted": { "title": "Trusted type", "trusted": "Trusted" }, "Type": { "all": "All types", "countries": "Countries", "ipRanges": "IP ranges", "privateLinks": "Private Links", "title": "Location type" }, "iPRangeInvalidError": "Value must be a valid IPv4 or IPv6 range.", "iPRangeLinkOrSiteLocalError": "IP network detected as a link local or site local address.", "iPRangeOctetError": "IP network must not start with 0 or 255.", "iPRangePrefixError": "IP network prefix must be from /{0} to /{1}.", "iPRangePrivateError": "IP network detected as a private address." }, "Policies": { "Grid": { "aria": "List of Conditional Access policies" }, "countText": "{0} out of {1} policies found", "countTextSingular": "{0} out of 1 policy found", "search": "Search policies" }, "PolicyControlFedAuthMethod": { "certificate": "Certificate authentication", "infoBubble": "Specify a required authentication method, that must be satisfied by federation provider, such as ADFS.", "multifactor": "Multi-factor authentication", "require": "Require federated authentication method (Preview)", "whatIfFormat": "{0} - {1}" }, "PolicyState": { "off": "Off", "on": "On", "reportOnly": "Report-only" }, "PolicyTemplates": { "Devices": { "description": "Select Devices policy template category to gain visibility into devices accessing the network. Ensure compliance and health status before granting access.", "name": "Devices" }, "Identities": { "description": "Select Identities policy template category to verify and secure each identity with strong authentication across your entire digital estate.", "name": "Identities" }, "Summary": { "CloudApps": { "allCloudApps": "All cloud apps", "office365": "Office 365", "registerSecurityInfo": "Register sercurity information" }, "Conditions": { "androidAndIOS": "Device Platform: Android and IOS", "anyDevice": "Any Device except Android, IOS, Windows and Mac", "anyDeviceStateExceptHybrid": "Any Device state except compliant and Hybrid Azure AD joined", "anyLocation": "Any location except trusted", "browserMobileDesktop": "Client apps: Browser, Mobile apps and desktop clients", "exchangeActiveSync": "Client Apps: Exchange Active Sync, Other Clients", "windowsAndMac": "Device Platform: Windows and Mac" }, "Grant": { "approvedClientApp": "Require approved client App OR app protection policy", "blockAccess": "Block Access", "mfa": "Require multi-factor authentication", "mfaCompliantDeviceOrHybrid": "Require MFA OR compliant device OR Hybrid Azure AD joined device", "requireHybridGrantControl": "Require compliant device or Hybrid Azure AD joined" }, "Session": { "appEnforcedRestrictions": "Use app enforced restrictions", "signInFrequency": "Sign-in Frequency and never persistent browser session" }, "UsersAndGroups": { "allUsers": "All Users except currrent Administrator", "directoryRoles": "Directory roles except current Administrator", "noGuestAndAdmins": "All Users except Guest and External, Global Administrators, Current Administrator" } }, "TemplateId": { "AppEnforcedRestrictions": { "description": "Application enforced restrictions for SharePoint Online and Exchange Online limits access on unmanaged devices. ", "name": "CA010: Use application enforced restrictions" }, "ApprovedClientApps": { "description": "To prevent data loss, organizations can restrict access to approved modern auth client apps with Intune app protection.", "name": "CA008: Require approved client apps and app protection" }, "BlockAccessOnUnknowns": { "description": "Block access when the device the user is signing-in from is unknown or unsupported device platform.", "name": "CA006: Block access for unknown device platform" }, "BlockLegacyAuth": { "description": "Block legacy authentication for all users using all cloud applications.", "name": "CA003: Block legacy authentication" }, "CompliantHybridADDevice": { "description": "Require device to be marked as compliant or Hybrid Azure AD joined when using modern auth client apps on Windows and macOS.", "name": "CA009: Require compliant or Hybrid Azure AD joined device for all users" }, "NoPersistentBrowserSession": { "description": "No persistent browser session when the device the user is signing-in from is not \"Hybrid Azure AD joined\" or \"marked as compliant\".", "name": "CA007: No persistent browser session" }, "RequireCompliantOrHybridAD": { "description": "Require device to be marked as compliant or Hybrid Azure AD joined for admins.​", "name": "CA005: Require compliant or Hybrid Azure AD joined device for admins" }, "RequireMFAAllUsers": { "description": "Require MFA for all users when using all cloud applications. ", "name": "CA004: Require MFA for all users" }, "RequireMFAForAdmins": { "description": "Require MFA for admins when using all cloud applications.", "name": "CA001: Require MFA for admins" }, "RequireSecurityInfo": { "description": "Require trusted locations for registering security information.", "name": "CA002: Require security information" } }, "basics": "Basics", "cloudAppsOrActions": "Cloud apps or actions ", "conditions": "Conditions ", "createNewPolicy": "Create new policy from templates", "customizeBuild": "Customize your build", "customizeTemplate": "Template lists are customized based on the type of policy you're looking to create", "grantControl": "Grant control ", "namePolicy": "Name your policy", "next": "Next", "policyName": "Policy Name", "policyState": "Policy state", "policySummary": "Policy Summary", "policyTemplate": "Policy Template", "previous": "Previous", "reviewAndCreate": "Review + Create", "selectATemplate": "Select a Template", "selectTemplate": "Select template", "selectTemplateRecommendation": "We recommend the following templates based on your response", "sessionControl": "Session Control ", "templateCategory": "Template category", "usersAndGroups": "Users and Groups " }, "SSM": { "MemberSelector": { "description": "Users and groups" }, "Notification": { "error": "Failed to update Continuous access evaluation settings", "inProgress": "Updating Continuous access evaluation settings", "success": "Successfully updated Continuous access evaluation settings" }, "PreviewOptions": { "autoEnable": "Auto enable after general availability", "disable": "Disable preview", "enable": "Enable preview" }, "StrictLocationEnforcement": { "infoContent1": "Different IPs can be seen by Azure AD and Resource Provider from the same client device due to network partition or IPv4/IPv6 mismatch. Strict Location Enforcement will enforce the Conditional Access policy based on both IP addresses seen by Azure AD and Resource Provider.", "infoContent2": "To ensure maximum security, it is recommended to include all IPs that can be seen by both Azure AD and Resource Provider in your Named Location policy and turn on \"Strict Location Enforcement\" mode.", "label": "Strict Location Enforcement", "title": "Additional enforcement modes" }, "autoEnabledInfo": "With the default setting, continuous access evaluation will be auto-enabled after general availability. Once you configure anything, the default setting will be removed.", "bladeTitle": "Continuous access evaluation (Preview)", "description": "When a user's access is removed or a client IP address changes, Continuous access evaluation automatically blocks access to resources and applications in near real time. ", "migrateLabel": "Migrate", "migrationInfo": "CAE setting has been moved under Conditional Access UX, please migrate with the “Migrate” button above and configure it with Conditional Access policy going forward. Click here to learn more.", "noLicenseMessage": "Manage smart session management settings with Azure AD Premium", "optionsPickerTitle": "Enable/Disable Continuous access evaluation", "upsellInfo": "This page cannot be accessed anymore, please use CAE settings under Conditional Access going forward. Click here to learn more." }, "SessionLifetime": { "PersistentBrowser": { "Error": { "notAllApps": "Persistent browser session policy only works correctly when \"All cloud apps\" is selected. Please update your cloud apps selection." }, "Option": { "always": "Always persistent", "help": "A persistent browser session allows users to remain signed in after closing and reopening their browser window.
\n