mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
editorial review
This commit is contained in:
parent
e6b6280435
commit
5d76b2c888
@ -47,10 +47,12 @@ Enhanced Phishing Protection can be configured via Microsoft Intune, Group Polic
|
||||
| Notify Password Reuse | This policy setting determines whether Enhanced Phishing Protection warns your users if they reuse their work or school password.<li> If you enable this policy setting, Enhanced Phishing Protection warns users if they reuse their work, or school password and encourages them to change it.</li><li> If you disable or don't configure this policy setting, Enhanced Phishing Protection doesn't warn users if they reuse their work or school password. |
|
||||
| Notify Unsafe App | This policy setting determines whether Enhanced Phishing Protection warns your users if they type their work or school passwords in Notepad or Microsoft 365 Office Apps.<li> If you enable this policy setting, Enhanced Phishing Protection warns your users if they store their password in Notepad or Microsoft 365 Office Apps.</li><li> If you disable or don't configure this policy setting, Enhanced Phishing Protection doesn't warn users if they store their password in Notepad or Microsoft 365 Office Apps. |
|
||||
|
||||
Enhanced Phishing Protection allows organizations to add their custom identity provider sign-in URL as a recognized URL. Then Enhanced Phishing Protection doesn't consider Microsoft passwords typed into an internal identity provider (IdP) as unknown or password reuse. Without knowledge of an enterprise's custom identity provider URL, SmartScreen might not have enough information about the URL. If you configure warning dialogs for Enhanced Phishing Protection, it might show an unsafe password usage dialog to the user entering their Microsoft password into the URL.
|
||||
|
||||
To add your organization's custom sign-in URL to Enhanced Phishing Protection, configure the `EnableWebSignIn` policy in the [Authentication Policy CSP](/windows/client-management/mdm/policy-csp-authentication#enablewebsignin). For more information, see [Web sign-in for Windows](../../../identity-protection/web-sign-in/index.md).
|
||||
|
||||
Follow these instructions to configure your devices using either Microsoft Intune, GPO or CSP.
|
||||
|
||||
Enhanced Phishing Protection allows enterprises to add their custom identity provider sign-in URL as a recognized URL so that Enhanced Phishing Protection does not consider Microsoft passwords typed into an internal identity provider as unknown or password reuse. Without knowledge of an enterprise’s custom IDP URL, SmartScreen may not have enough information about the URL and, if UX warning dialogs are configured for Enhanced Phishing Protection, may show an unsafe password usage dialog to the user entering their Microsoft password into the URL.
|
||||
To add your enterprise's custom sign-in URL to Enhanced Phishing Protection, configure the EnableWebSignIn policy described here: [Authentication Policy CSP - Windows Client Management | Microsoft Learn](/windows/client-management/mdm/policy-csp-authentication"https://learn.microsoft.com/en-us/windows/client-management/mdm/policy-csp-authentication#enablewebsignin"). Learn more about Web Sign-in for Windows here: [Web sign-in for Windows - Windows Security | Microsoft Learn](/windows/security/identity-protection/web-sign-in/?tabs=intune"https://learn.microsoft.com/en-us/windows/security/identity-protection/web-sign-in/?tabs=intune")_._
|
||||
#### [:::image type="icon" source="../../../images/icons/intune.svg"::: **Intune**](#tab/intune)
|
||||
|
||||
To configure devices using Microsoft Intune, create a [**Settings catalog** policy][MEM-2], and use the settings listed under the category **`SmartScreen > Enhanced Phishing Protection`**:
|
||||
|
Loading…
x
Reference in New Issue
Block a user