Stop using per-user MFA for #AzureAD MFA. "Don't enable or enforce per-user Azure AD Multi-Factor Authentication if you use Conditional Access policies." learn.microsoft.com/en-us/azure/ac…
If you are still using per-user MFA, and can deploy conditional access policies, deploy the template to require MFA for all users and disable per user MFA. Conversion script here learn.microsoft.com/en-us/azure/ac… (we need to update this to use MS Graph SDK PowerShell and not MSOL) @merill
If you are using a free tenant or you have not enabled conditional access you have enabled the tenant security defaults right? You should go check your tenant right now if you don't know. learn.microsoft.com/en-us/microsof…
Also if you have not enabled Azure MFA number matching for Microsoft Authenticator push notifications, you really should learn.microsoft.com/en-us/azure/ac… it is already on for #passwordless phone sign in so enable it for MFA notifications too.
#azuread has had the usage and insights dashboard for MFA registration and usage since 2019! Have you reviewed your organization lately? How much of your authentication is still only using single factor auth? It lets you know actions you need to take. techcommunity.microsoft.com/t5/microsoft-e…
Deploying strong authentication credentials as #MFA and #passwordless are only effective when you actually use them
❓are you not requiring MFA all the time?
🔥Trusted networks (intranet) are a policy scoping clause NOT a control. No network is safe enough to use just a password
Reduce the # of MFA Prompts NOT the requirement of MFA for accessing resources. They are very different outcomes.
🔥Require MFA for All Users, All The time via CA policy
🎁 Improve user experience, deploy #Passwordless to use strong auth all the time instead of prompting them.
Check out aka.ms/whfb for more on deploying it. Deploy Cloud Trust if your OS supports it, and while you upgrade OS deploy Key Trust if you have pre-reqs already in place.
And if you are on Linux/MacOS/Android,IOS, today I would use Authenticator and deploy the SSO Extensions token brokers as we talked about on Twitter Spaces show last week 425show.com/spaces
• • •
Missing some Tweet in this thread? You can try to
force a refresh
Just a reminder when focusing on #security for your #office365 and #azuread tenants one of the key attack vectors comes from your on-premises environment. If you have not read and implemented the guidance in aka.ms/protectm365 you should & read this thread. 1/7 #identity
"Federated trust relationships, such as Security Assertions Markup Language (SAML) authentication,are used to authenticate to Microsoft 365 through your on-premises identity infrastructure.Ifa SAML token-signing certificate is compromised, federation allows anyone who has.."2/7
certificate to impersonate any user in your cloud.
We recommend that you disable federation trust relationships for authentication to Microsoft 365 when possible."
3/7