Jef Kazimer Profile picture
Sep 24 10 tweets 5 min read
Stop using per-user MFA for #AzureAD MFA. "Don't enable or enforce per-user Azure AD Multi-Factor Authentication if you use Conditional Access policies." learn.microsoft.com/en-us/azure/ac…
If you are still using per-user MFA, and can deploy conditional access policies, deploy the template to require MFA for all users and disable per user MFA. Conversion script here learn.microsoft.com/en-us/azure/ac… (we need to update this to use MS Graph SDK PowerShell and not MSOL) @merill
If you are using a free tenant or you have not enabled conditional access you have enabled the tenant security defaults right? You should go check your tenant right now if you don't know. learn.microsoft.com/en-us/microsof…
Also if you have not enabled Azure MFA number matching for Microsoft Authenticator push notifications, you really should learn.microsoft.com/en-us/azure/ac… it is already on for #passwordless phone sign in so enable it for MFA notifications too.
#azuread has had the usage and insights dashboard for MFA registration and usage since 2019! Have you reviewed your organization lately? How much of your authentication is still only using single factor auth? It lets you know actions you need to take. techcommunity.microsoft.com/t5/microsoft-e…
Deploying strong authentication credentials as #MFA and #passwordless are only effective when you actually use them
❓are you not requiring MFA all the time?
🔥Trusted networks (intranet) are a policy scoping clause NOT a control. No network is safe enough to use just a password
Reduce the # of MFA Prompts NOT the requirement of MFA for accessing resources. They are very different outcomes.
🔥Require MFA for All Users, All The time via CA policy
🎁 Improve user experience, deploy #Passwordless to use strong auth all the time instead of prompting them.
For Windows users I usually recommend WHFB AND Microsoft Authenticator Phone Sign in - learn.microsoft.com/en-us/windows/… learn.microsoft.com/en-us/azure/ac…
Check out aka.ms/whfb for more on deploying it. Deploy Cloud Trust if your OS supports it, and while you upgrade OS deploy Key Trust if you have pre-reqs already in place.
And if you are on Linux/MacOS/Android,IOS, today I would use Authenticator and deploy the SSO Extensions token brokers as we talked about on Twitter Spaces show last week 425show.com/spaces

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Jef Kazimer

Jef Kazimer Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @JefTek

Aug 31
Just a reminder when focusing on #security for your #office365 and #azuread tenants one of the key attack vectors comes from your on-premises environment. If you have not read and implemented the guidance in aka.ms/protectm365 you should & read this thread. 1/7 #identity
"Federated trust relationships, such as Security Assertions Markup Language (SAML) authentication,are used to authenticate to Microsoft 365 through your on-premises identity infrastructure.Ifa SAML token-signing certificate is compromised, federation allows anyone who has.."2/7
certificate to impersonate any user in your cloud.

We recommend that you disable federation trust relationships for authentication to Microsoft 365 when possible."
3/7
Read 14 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(