

Just navigate to and select the user for whom you want to enable MFA. The first way is the oldest and most known. Multifactor Authentication can be enabled in two different ways, enabling it on a user basis through the Office365 admin center or with a Conditional Access policy in Azure AD.

This first part will focus on enabling Multifactor Authentication.

Through this three part series I will guide you through the best practices of setting up MFA, disabling basic authentication and configuring a break the glass administrator account. Multifactor Authentication plays a big part in this process.īut implementing MFA into an Microsoft 365 environment can be pretty confusing. With the amount of attacks on cloud identities increasing each day, it is paramount to secure our identities. Multifactor Authentication is a hot topic at the moment.
