Enable Security Defaults for basic MFA, or use Conditional Access for more control. Security Defaults is one toggle. Conditional Access requires Azure AD Premium but gives you granular policies. Either way, require MFA for all users, no exceptions.
Quick answer: Enable Security Defaults for basic MFA, or use Conditional Access for more control. Security Defaults is one toggle. Conditional Access requires Azure AD Premium but gives you granular policies. Either way, require MFA for all users, no exceptions.
Two Approaches
Security Defaults (Simple)
- Free with any Microsoft 365 plan
- One toggle to enable
- Requires MFA for all users
- Limited customisation
Conditional Access (Recommended)
- Requires Azure AD Premium P1 (included in Business Premium, E3, E5)
- Granular policy control
- Risk-based authentication
- Device compliance integration
Option 1: Enable Security Defaults
Steps:
- Sign in to Azure Portal (portal.azure.com) as Global Admin
- Navigate to Azure Active Directory > Properties
- Click Manage Security Defaults
- Set Enable Security Defaults to Yes
- Save
- All users required to register for MFA within 14 days
- MFA required for admin roles every sign-in
- MFA required for all users when needed (risky sign-ins)
- Legacy authentication blocked
- All or nothing—can't exclude users
- Can't customise conditions
- No device compliance options
Option 2: Conditional Access (Better)
Basic "MFA for everyone" policy
- Sign in to Azure Portal as Global Admin
- Navigate to Azure Active Directory > Security > Conditional Access
- Click New Policy
- Name: "Require MFA for all users"
- Users: All users (exclude break-glass emergency accounts)
- Cloud apps: All cloud apps
- Conditions: (leave default)
- Grant: Require multi-factor authentication
Additional recommended policies
Block legacy authentication:
- Users: All users
- Cloud apps: All cloud apps
- Conditions: Client apps > Other clients
- Grant: Block
- Users: Directory roles > Select admin roles
- Cloud apps: All cloud apps
- Grant: Require MFA
- Users: All users
- Cloud apps: Select apps (SharePoint, etc.)
- Grant: Require compliant device
Before You Enable
Communicate to users
Tell people MFA is coming:- What to expect
- How to register
- Support resources
Test first
Use Report-only mode for Conditional Access policies. Review sign-in logs to see what would happen.Plan for exceptions
You need break-glass accounts excluded from MFA in case of emergency. Secure these differently (hardware keys, secure location).Handle legacy apps
Some apps don't support modern authentication. Identify them before blocking legacy auth.MFA Methods
Microsoft Authenticator app (recommended):
- Push notifications
- Number matching (configure this)
- Passwordless option
- SMS codes (less secure)
- Phone call (less secure)
- FIDO2 keys (most secure)
- Best for admins
Common Mistakes
Excluding too many users "Everyone except sales" defeats the purpose. MFA for all, no exceptions.
Not enabling number matching Without it, users can approve MFA prompts without knowing what they're approving (MFA fatigue attacks).
Forgetting service accounts Service accounts need MFA too, or need to be properly secured alternatively.
No break-glass accounts If MFA breaks and no one can sign in, you need emergency access. Plan for this.
What We Configure
For managed clients, we implement Conditional Access properly:
- MFA required for all users
- Number matching enabled
- Legacy authentication blocked
- Risk-based policies active
- Admin accounts extra-protected
- Break-glass accounts secured
- Monitoring enabled
---
about Microsoft 365 security.
---
