Multifactor authentication means you and your employees must provide more than one way to sign in to Microsoft 365 is one of the easiest ways to secure your business. Based on your understanding of multifactor authentication (MFA) and its support in Microsoft 365, it’s time to set it up and roll it out to your organization.
- Go to the Microsoft 365 admin center at https://admin.microsoft.com.
- Select Show All, then choose the Azure Active Directory Admin Center.
- Select Azure Active Directory, Properties, Manage Security defaults
- Under Enable Security defaults, select Yes and then Save.
Before you begin
You must be a Global admin to manage MFA. For more information, see About admin roles. If you have legacy per-user MFA turned on, Turn off legacy per-user MFA. If you have Office 2013 clients on Windows devices, turn on Modern Authentication for Office 2013 clients.
Advanced: If you have third-party directory services with Active Directory Federation Services (AD FS), set up the Azure MFA Server. See advanced scenarios with Azure AD Multifactor Authentication and third-party VPN solutions for more information.
Turn off legacy per-user MFA
If you’ve previously turned on per-user MFA, you must turn it off before enabling Security defaults.
- In the Microsoft 365 admin center, in the left nav choose Users > Active users.
- On the Active Users page, choose Multi-factor authentication.
- On the multi-factor authentication page, select each user and set their Multi-Factor auth status to Disabled.
Turn Security defaults on or off
For most organizations, Security defaults offer a good level of additional sign-in security. For more information, see What are security defaults? If your subscription is new, Security defaults might already be turned on for you automatically. You enable or disable security defaults from the Properties pane for Azure Active Directory (Azure AD) in the Azure portal.
- Sign in to the Microsoft 365 admin center with global admin credentials.
- In the left nav choose Show All and under Admin centers, choose Azure Active Directory.
- In the Azure Active Directory admin center choose Azure Active Directory > Properties.
- At the bottom of the page, choose Manage Security defaults.
- Choose Yes to enable security defaults or No to disable security defaults, and then choose Save.
If you have been using baseline Conditional Access policies, you’ll be prompted to turn them off before you move to use security defaults.
- Go to the Conditional Access – Policies page.
- Choose each baseline policy that is On and set Enable policy to Off.
- Go to the Azure Active Directory – Properties page.
- At the bottom of the page, choose Manage Security defaults.
- Choose Yes to enable security defaults and No to disable security defaults, and then choose Save.
Use Conditional Access policies
If your organization has more granular sign-in security needs, Conditional Access policies can offer you more control. Conditional Access lets you create and define policies that react to sign-in events and request additional actions before a user is granted access to an application or service.
Conditional Access is available for customers who have purchased Azure AD Premium P1, or licenses that include this, such as Microsoft 365 Business Premium, and Microsoft 365 E3. For more information, see Create a Conditional Access policy.
Risk-based conditional access is available through Azure AD Premium P2 license, or licenses that include this, such as Microsoft 365 E5. For more information, see risk-based Conditional Access.
For more information about the set-up of multifactor Authentication, please contact us via email: itm@it-management.vn or hotline: 1900 94 50