skip to Main Content

Increase and improve Azure MFA security

It’s necessary to protect your organization and have strong security to prevent MFA fatigue. That’s why you need to increase and improve Azure MFA security for the tenant. To secure your MFA sign-ins, enable the features number matching, application name, and geographic location. In this article, you will learn the Microsoft 365 MFA security best practices to secure your Microsoft 365 tenant.

Configure MFA in Azure or Microsoft 365

Before you start, you need to configure MFA in Azure or Microsoft 365. Otherwise, the user or users will not have MFA security enabled correctly, and the below MFA security configuration will not work.

Go through one of the below articles to enable MFA:

  1. Configure Azure AD MFA
  2. Configure per-user MFA in Microsoft 365

We suggest you use method 1 and configure Azure AD Multi-Factor Authentication. But it requires having Azure AD Premium plan 1 or 2.

Note: You can enable MFA for a single user or all users in both methods. We recommend to enable MFA for all users and only exclude service accounts.

Azure MFA Security best practices

Enable the following three options in Azure AD to increase and improve your Azure MFA security:

  1. Require number matching for push notifications
    When a user gets a notification to enter the number in the Microsoft Authenticator app.
  1. Show application name in push and passwordless notifications
    The user receives a passwordless phone sign-in or MFA push notification in Microsoft Authenticator. They will see the application’s name that requests approval from where the sign-in is made.
  1. Show geographic location in push and passwordless notifications
    The user receives a passwordless phone sign-in or MFA push notification in Microsoft Authenticator. The user will see a geographic location map that requests approval from where the sign-in is made.

Let’s see how to enable these three features in the next step.

Note: Microsoft will enforce MFA number matching by default for all Microsoft Authenticators users after February 27, 2023.

Enable Azure MFA security options

To enable the options in Azure AD, follow the below steps:

  1. Sign in to Microsoft Azure Portal
  2. Expand Menu and click on Azure Active Directory
Sign in to Microsoft Azure Active Directory
  1. Scroll down and click on Security
Microsoft Azure Security
  1. Click on Authentication methods
Authentication methods in Microsoft Azure security
  1. Click on Policies
  2. Click on Microsoft Authenticator
Policies Microsoft Authenticator
  1. Click on Enable and Target tab
  2. Enable > On
  3. Target: Include > All users
  4. Authentication mode > Select Any

Note: If you click Save, you will be redirected to Policies Microsoft Authenticator.

Enable and Target MFA security to all users
  1. Click on the Configure tab
Configure and improve Azure MFA security configure
  1. Go to each one of the features:
  • Require number matching for push notifications
  • Show application name in push and passwordless notifications
  • Show geographic location in push and passwordless notifications

Change the below settings for all three features:

  • Status > select Enabled
  • Target: Include > All users
  1. Click Save
Improve MFA security enable
  1. The policy was successfully saved notification appears, and the Microsoft Authenticator method shows the target (all users) and status (enabled)
Increase and improve Azure MFA security enabled all users

It’s always essential to test the configuration once it’s active. Let’s look into that in the next step.

Test Azure MFA security configuration

To ensure you enabled all three Microsoft Authenticator features correctly, you can test by following the steps below:

  1. Sign in to Microsoft Office
  2. Type your user account and password
  3. Click Sign in

Note: The account needs to be MFA enabled, and the Authenticator app needs to be installed on the mobile device.

Increase and improve Azure MFA security
  1. A random number will display, which you need to enter in the Authenticator app
Microsoft Authenticator app to increase Azure MFA security
  1. Enter the number in the Authenticator app
  2. Tap on Yes
Authenticator app verification Microsoft Security
  1. You successfully did sign into your Microsoft 365 account with Azure MFA security protection enabled
Increase and improve Azure MFA security

That’s it!

Read more: Save sent items in shared mailbox »

Conclusion

You learned how to increase and improve Azure AD MFA security. We recommend enabling number matching, application name, and geographic location to protect your organization.

The o365info Team

The o365info Team

This article was written by our team of experienced IT architects, consultants, and engineers.

This Post Has 0 Comments

Leave a Reply

Your email address will not be published. Required fields are marked *