How to set passwords to never expire in Microsoft 365? Microsoft recommends to set the…
Increase and improve Azure MFA security
It’s necessary to protect your organization and have strong security to prevent MFA fatigue. That’s why you need to increase and improve Azure MFA security for the tenant. To secure your MFA sign-ins, enable the features number matching, application name, and geographic location. In this article, you will learn the Microsoft 365 MFA security best practices to secure your Microsoft 365 tenant.
Table of contents
Configure MFA in Azure or Microsoft 365
Before you start, you need to configure MFA in Azure or Microsoft 365. Otherwise, the user or users will not have MFA security enabled correctly, and the below MFA security configuration will not work.
Go through one of the below articles to enable MFA:
We suggest you use method 1 and configure Azure AD Multi-Factor Authentication. But it requires having Azure AD Premium plan 1 or 2.
Note: You can enable MFA for a single user or all users in both methods. We recommend to enable MFA for all users and only exclude service accounts.
Azure MFA Security best practices
Enable the following three options in Azure AD to increase and improve your Azure MFA security:
- Require number matching for push notifications
When a user gets a notification to enter the number in the Microsoft Authenticator app.
- Show application name in push and passwordless notifications
The user receives a passwordless phone sign-in or MFA push notification in Microsoft Authenticator. They will see the application’s name that requests approval from where the sign-in is made.
- Show geographic location in push and passwordless notifications
The user receives a passwordless phone sign-in or MFA push notification in Microsoft Authenticator. The user will see a geographic location map that requests approval from where the sign-in is made.
Let’s see how to enable these three features in the next step.
Note: Microsoft will enforce MFA number matching by default for all Microsoft Authenticators users after February 27, 2023.
Enable Azure MFA security options
To enable the options in Azure AD, follow the below steps:
- Sign in to Microsoft Azure Portal
- Expand Menu and click on Azure Active Directory
- Scroll down and click on Security
- Click on Authentication methods
- Click on Policies
- Click on Microsoft Authenticator
- Click on Enable and Target tab
- Enable > On
- Target: Include > All users
- Authentication mode > Select Any
Note: If you click Save, you will be redirected to Policies – Microsoft Authenticator.
- Click on the Configure tab
- Go to each one of the features:
- Require number matching for push notifications
- Show application name in push and passwordless notifications
- Show geographic location in push and passwordless notifications
Change the below settings for all three features:
- Status > select Enabled
- Target: Include > All users
- Click Save
- The policy was successfully saved notification appears, and the Microsoft Authenticator method shows the target (all users) and status (enabled)
It’s always essential to test the configuration once it’s active. Let’s look into that in the next step.
Test Azure MFA security configuration
To ensure you enabled all three Microsoft Authenticator features correctly, you can test by following the steps below:
- Sign in to Microsoft Office
- Type your user account and password
- Click Sign in
Note: The account needs to be MFA enabled, and the Authenticator app needs to be installed on the mobile device.
- A random number will display, which you need to enter in the Authenticator app
- Enter the number in the Authenticator app
- Tap on Yes
- You successfully did sign into your Microsoft 365 account with Azure MFA security protection enabled
That’s it!
Read more: Save sent items in shared mailbox »
Conclusion
You learned how to increase and improve Azure AD MFA security. We recommend enabling number matching, application name, and geographic location to protect your organization.
This Post Has 0 Comments