MFA Enforcement Strategies
Approaches to rolling out multi-factor authentication across an organisation.
Rollout Strategy
Start MFA rollout with privileged accounts — Global Admins, service accounts, and anyone with elevated access. Then extend to all users in phases, grouped by department or location. Use Entra ID Conditional Access to enforce MFA based on risk signals, location, or specific applications.
Recommended Rollout Order
- Phase 1 — Global Admins and Privileged Role holders
- Phase 2 — IT staff and service desk
- Phase 3 — Finance, HR, and other sensitive departments
- Phase 4 — All remaining users, by office location or region
- Phase 5 — Guest and external accounts
Authentication Methods
Provide users with clear setup instructions and a reasonable grace period for registration. Not all MFA methods are equal — choose based on your security requirements and user population.
- Microsoft Authenticator app — push notifications, passwordless capable
- FIDO2 security keys — hardware-based, phishing-resistant
- Windows Hello for Business — biometric or PIN tied to the device TPM
- SMS / voice call — widely supported but weakest option
- Hardware OATH tokens — for users without smartphones
Warning
SMS is vulnerable to SIM-swapping attacks. Avoid using SMS as the primary MFA method for privileged accounts. Prefer the Authenticator app or FIDO2 security keys for any account with elevated access.
Monitoring Adoption
Monitor the authentication methods registration report to track adoption progress and identify holdouts.
Connect-MgGraph -Scopes "UserAuthenticationMethod.Read.All"
Get-MgReportAuthenticationMethodUserRegistrationDetail |
Select-Object UserPrincipalName, IsMfaRegistered, DefaultMfaMethod |
Export-Csv "C:\MFA_Status.csv" -NoTypeInformationTip
Set a Conditional Access policy that forces MFA registration within a grace period. After the deadline, users who have not registered are blocked until they complete setup — this drives adoption without constant reminders.
Blocking Legacy Authentication
Legacy authentication protocols bypass MFA entirely. Blocking them is a critical companion step to any MFA rollout.
# This policy blocks sign-ins using legacy protocols
# (POP, IMAP, SMTP, ActiveSync with basic auth)
# Deploy in report-only mode first, then enforce
New-MgIdentityConditionalAccessPolicy -BodyParameter @{
DisplayName = "Block Legacy Authentication"
State = "enabledForReportingButNotEnforced"
Conditions = @{
ClientAppTypes = @("exchangeActiveSync", "other")
Users = @{ IncludeUsers = @("All") }
}
GrantControls = @{
BuiltInControls = @("block")
Operator = "OR"
}
}Warning
Before enforcing the legacy auth block, check the Entra sign-in logs for active legacy protocol usage. Some older printers, scanners, and LOB applications rely on SMTP basic auth and will break.