Implementing ConditionalAccess MFA
Implementing ConditionalAccess MFA
Key things we need to think about when making the correct choice for our organization:
• Do you want to enable it for all user accounts, per individual account, or based on group
membership?
• Which kind of additional verification method do you need? A mobile app, text message, or
phone call?
• Should MFA always be required or only when accessing certain apps or some other criteria?
For instance, when a user attempts to sign in from outside the company network?
• Do you need advanced risk detection like a typical travel, anonymous IP address, malware linked
IP address, etc.?
• Which Microsoft 365 license plan do you have? Some methods require Azure AD Premium P1
or Azure AD Premium P2 licenses.
Below table helps us to decide which option is best for us based on our requirement –
Conditional Access Policies:
Prerequisites
A working Azure AD tenant with Azure AD Premium license.
An account with Conditional Access administrator privileges.
A test user and group (non-administrator) that allows you to verify policies work as expected
before you impact real users.
8. Under Access controls, > Grant, select Grant access, Require multi-factor authentication,
and select Select.
9. Confirm your settings and set Enable policy to Report-only.
10. Select Create to enable your policy.
Initially, we put this policy into Report-only mode so administrators can determine their impact
on existing users. When administrators are comfortable that the policy applies as they intend,
they can switch to On or stage the deployment by adding specific groups and excluding others.