Why is everyone so excited about the new #azuread Authentication Strength feature in Conditional Access that was announced at Ignite last month?
Here's are short thread about the feature.
PS. There is a bonus if you read all the way to the end 😉👇
This illustration from @Yubico shows that not all MFA is of equal strength when protecting your users. Some like Phone number and email are very weak compared to others.
That's all well and good but moving our users off Voice/SMS is going to take some time.
Now this is where Authentication Strength comes into play. Before this feature was released, the only way to remove phone MFA was to turn it off at the tenant level at adlegacymfa.cmd.ms
As you can imagine it's going to be total chaos if you unchecked the Phone and SMS options for all your users.
Instead what you really want is to gradually improve the auth strength in your org.
An ideal place to start could be to remove Phone/SMS for privileged admin users.
Applying Auth Strengths is a two step process.
#1 Decide/ define the Authentication Strength
You can use one of the built-in strengths or create your own.
Here I'm following NIST guidelines and creating a custom auth strength that excludes SMS & Voice.
#2 Enforce the Auth Strength using a Conditional Policy
Next we head over to adca.cmd.ms and define a CA policy that requires this new auth strength.
Since this is in CA you get to use all the various filters to scope the where and when this strength is enforced.
All set!
Now the most important part. What is the user's experience?
If their original MFA doesn't meet the requirement the user is prompted with a step up experience to the stronger auth.
For this user we applied a policy that excluded Voice.
You’re about to witness ONE. BIG. BEAUTIFUL. ABSURDLY. EPIC. THREAD. 🧵🔥
Some say this might be the MOST EPIC and MOST RIDICULOUSLY LONG identity thread ever written
📗 Bookmark this
Honestly… the cover image alone deserves a like + retweet
DO IT 😂
Who doesn't like Free!
If you have E5 and the required number of users you can now start running the Conditional Access Optimization Agent which only consumes one SCU per day (you can even run it weekly if you want)
Want a deep dive into the agents?
Queue up these podcast episodes I recorded with the Microsoft PMs for these agents
So your Microsoft 365 tenant has been compromised by a malicious app!
Here's a step by step guide to block access to the app and remove it from your tenant -Bkmk this!
1️⃣ Go to Microsoft Entra → Enterprise Apps
2️⃣ Select the compromised app
3️⃣ Permissions → Review Permissions
Select 'This app is malicious and I'm compromised'
Follow the recommendations to
✅ Disable the app
Then run the PowerShell scripts that is generated to
✅ Require user assignment
✅ Revoke all permissions
✅ Invalidate refresh tokens of users with access to the app