<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Deploy MFA Using Azure AD Conditional Access Archives - the Sysadmin Channel</title>
	<atom:link href="https://thesysadminchannel.com/tag/deploy-mfa-using-azure-ad-conditional-access/feed/" rel="self" type="application/rss+xml" />
	<link>https://thesysadminchannel.com/tag/deploy-mfa-using-azure-ad-conditional-access/</link>
	<description>Documenting My Life as a System Administrator</description>
	<lastBuildDate>Mon, 16 Nov 2020 15:19:11 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
<site xmlns="com-wordpress:feed-additions:1">144174110</site>	<item>
		<title>Deploy MFA Using Azure AD Conditional Access</title>
		<link>https://thesysadminchannel.com/deploy-mfa-using-azure-ad-conditional-access/</link>
					<comments>https://thesysadminchannel.com/deploy-mfa-using-azure-ad-conditional-access/#respond</comments>
		
		<dc:creator><![CDATA[Paul Contreras]]></dc:creator>
		<pubDate>Fri, 24 May 2019 02:37:38 +0000</pubDate>
				<category><![CDATA[Azure]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Conditional Access for multi factor authentication]]></category>
		<category><![CDATA[Deploy MFA Using Azure AD Conditional Access]]></category>
		<category><![CDATA[EMS Licenses]]></category>
		<category><![CDATA[Enterprise Mobility Suite]]></category>
		<category><![CDATA[MFA using Conditional Access]]></category>
		<guid isPermaLink="false">https://thesysadminchannel.com/?p=1668</guid>

					<description><![CDATA[<p>In this article we&#8217;re going to walk through the steps needed to deploy MFA using Azure AD Conditional Access. The basic gist is we&#8217;ll enforce multi-factor authentication for all users in the tenant with the exception of our break glass&#8230; <a href="https://thesysadminchannel.com/deploy-mfa-using-azure-ad-conditional-access/" class="more-link">Continue Reading <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a href="https://thesysadminchannel.com/deploy-mfa-using-azure-ad-conditional-access/">Deploy MFA Using Azure AD Conditional Access</a> appeared first on <a href="https://thesysadminchannel.com">the Sysadmin Channel</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In this article we&#8217;re going to walk through the steps needed to <strong>deploy MFA using Azure AD Conditional Access</strong>.  The basic gist is we&#8217;ll enforce multi-factor authentication for all users in the tenant with the exception of our <a href="https://thesysadminchannel.com/break-glass-account-what-is-it-and-why-do-you-need-it/" rel="noopener noreferrer" target="_blank">break glass account</a>, our Azure AD Connect sync account and an MFA exclusions group we created. The best part about it, is that it can all be automated!  And we love our automated processes. There are however, a couple of settings we&#8217;ll need to check before rolling out MFA so we&#8217;ll start off by taking a look at those first. Another important thing to note is that you&#8217;ll need an Azure AD Premium license to use conditional access so it will cost a little money upfront. </p>
<p><em>If you have any questions on anything in this article, watch the video demo at the bottom of the page or feel free to drop me a comment and I&#8217;ll do my best to get back to you.</em></p>
<h2>Multi-Factor Authentication (MFA) &#8211; Getting Started</h2>
<p>As mentioned above, if you haven&#8217;t deployed MFA in your tenant at all, there are some basic settings we need to look at before hand.  We can access those settings via the direct link or navigating through the portal.  Below you can find how to do both.</p>
<ul>
<li>Configure MFA Settings Direct Link: <a href="https://account.activedirectory.windowsazure.com/usermanagement/mfasettings.aspx" rel="noopener noreferrer" target="_blank">https://account.activedirectory.windowsazure.com/usermanagement/mfasettings.aspx</a>.</li>
<li>Navigate through the portal: <strong><a href="https://portal.azure.com" rel="noopener noreferrer" target="_blank">https://portal.azure.com</a></strong> -> <strong>Azure Active Directory</strong> -> <strong>Security</strong> -> <strong>MFA</strong> -> <strong>Configure additional cloud-based MFA settings</strong></li>
</ul>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2020/11/Azure-MFA-Getting-Started.png" target="_blank" rel="noopener noreferrer"><img fetchpriority="high" decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2020/11/Azure-MFA-Getting-Started.png" alt="Azure MFA Getting Started" width="762" height="454" class="aligncenter size-full wp-image-2520" srcset="https://thesysadminchannel.com/wp-content/uploads/2020/11/Azure-MFA-Getting-Started.png 762w, https://thesysadminchannel.com/wp-content/uploads/2020/11/Azure-MFA-Getting-Started-125x75.png 125w" sizes="(max-width: 762px) 100vw, 762px" /></a></p>
<p>&nbsp;</p>
<p>Once there you&#8217;ll be prompted with some simple options.<br />
<div id="attachment_2521" style="width: 970px" class="wp-caption aligncenter"><a href="https://thesysadminchannel.com/wp-content/uploads/2019/05/Multi-Factor-Authentication-Service-Settings-Updated.png" target="_blank" rel="noopener noreferrer"><img decoding="async" aria-describedby="caption-attachment-2521" src="https://thesysadminchannel.com/wp-content/uploads/2019/05/Multi-Factor-Authentication-Service-Settings-Updated.png" alt="Multi-Factor-Authentication-Service-Settings-Updated" width="960" height="915" class="size-full wp-image-2521" srcset="https://thesysadminchannel.com/wp-content/uploads/2019/05/Multi-Factor-Authentication-Service-Settings-Updated.png?v=1605536825 960w, https://thesysadminchannel.com/wp-content/uploads/2019/05/Multi-Factor-Authentication-Service-Settings-Updated-768x732.png?v=1605536825 768w" sizes="(max-width: 960px) 100vw, 960px" /></a><p id="caption-attachment-2521" class="wp-caption-text">These are the typical settings I like to set in my tenant.</p></div></p>
<h4>App Passwords</h4>
<ul>
<li>App passwords are most commonly needed for orgs that have older versions of Office, such as Office 2010.  Office 2016 supports modern auth and ADAL</li>
<li>App passwords have been a pain in my experience and not user friendly</li>
</ul>
<h4>Trusted IPs</h4>
<ul>
<li>Trusted IPs are used if you want to bypass MFA</li>
<li>IPs can be easily spoofed so I&#8217;ve never enabled this in production</li>
</ul>
<h4>Verification Options</h4>
<ul>
<li>Call and Text are considered insecure in today&#8217;s standards so I leave them unchecked</li>
<li>Notification through mobile app uses the Microsoft Authenticator App and is very convenient</li>
<li>Verification uses a 6 digit code and you have to manually enter in at the prompt. Less convenient</li>
</ul>
<h4>Remember Multi-Factor Authentication</h4>
<ul>
<li>Set a number of days the token remains valid. Environments I&#8217;ve seen typically use 30 days</li>
<li>This is a per device setting. If a new device authenticates, it will need to MFA</li>
</ul>
<p>&nbsp;</p>
<h2>Deploy MFA Using Azure AD Conditional Access</h2>
<p>Now that we have the basics out of the way, lets deploy MFA using Azure AD Conditional Access.  Again, conditional access is part of the Azure AD Premium license so you will need to purchase that. Typically, you can get Enterprise Mobility + Security (EMS) E3 and that should be cover the licenses needed for this. EMS E3 also gives you the license for Intune and Mobile Device Management (MDM) but that&#8217;s a separate topic.</p>
<ul>
<li>In the <strong>Azure Portal</strong> -> go to <strong>Azure Active Directory</strong> -> <strong>Security</strong> -> <strong>Conditional Access</strong></li>
<li>Create a New Policy and name it <strong>Common Policy &#8211; Require MFA For All Users</strong></li>
</ul>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2019/05/Azure-New-Conditional-Access-Policy.png" target="_blank" rel="noopener noreferrer"><img decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2019/05/Azure-New-Conditional-Access-Policy.png" alt="Deploy MFA Using Azure AD Conditional Access" width="821" height="492" class="aligncenter size-full wp-image-2522" srcset="https://thesysadminchannel.com/wp-content/uploads/2019/05/Azure-New-Conditional-Access-Policy.png?v=1605537260 821w, https://thesysadminchannel.com/wp-content/uploads/2019/05/Azure-New-Conditional-Access-Policy-125x75.png?v=1605537260 125w, https://thesysadminchannel.com/wp-content/uploads/2019/05/Azure-New-Conditional-Access-Policy-768x460.png?v=1605537260 768w" sizes="(max-width: 821px) 100vw, 821px" /></a><br />
&nbsp;</p>
<ul>
<li>Under <strong>Users and Groups</strong>: Specify <strong>All Users</strong> in the Include Tab</li>
<li>Having MFA enforced on all users is highly recommended, if that&#8217;s not possible, apply it to a preferred group.</li>
</ul>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2019/05/All-Users-MFA-Policy-Include.png" target="_blank" rel="noopener noreferrer"><img decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2019/05/All-Users-MFA-Policy-Include.png" alt="All Users MFA Policy Include to deploy MFA using conditional access" width="902" height="571" class="aligncenter size-full wp-image-2523" srcset="https://thesysadminchannel.com/wp-content/uploads/2019/05/All-Users-MFA-Policy-Include.png?v=1605537906 902w, https://thesysadminchannel.com/wp-content/uploads/2019/05/All-Users-MFA-Policy-Include-768x486.png?v=1605537906 768w" sizes="(max-width: 902px) 100vw, 902px" /></a><br />
&nbsp;</p>
<ul>
<li>Under Users and Group: Specify your exclusions group</li>
<li><strong>IMPORTANT!</strong>:  Be sure to add a break glass account, your Azure Sync account and group for Service Accounts at very the minimum</li>
</ul>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2019/05/All-Users-MFA-Policy-Exclude-Group.png" target="_blank" rel="noopener noreferrer"><img decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2019/05/All-Users-MFA-Policy-Exclude-Group.png" alt="All Users MFA Policy Exclude Group" width="800" height="590" class="aligncenter size-full wp-image-2524" srcset="https://thesysadminchannel.com/wp-content/uploads/2019/05/All-Users-MFA-Policy-Exclude-Group.png?v=1605538114 800w, https://thesysadminchannel.com/wp-content/uploads/2019/05/All-Users-MFA-Policy-Exclude-Group-768x566.png?v=1605538114 768w" sizes="(max-width: 800px) 100vw, 800px" /></a><br />
&nbsp;</p>
<ul>
<li>Under <strong>Cloud Apps or Actions</strong>: Specify All Cloud Apps</li>
<li>This will enforce MFA on all Microsoft apps such as Email, SharePoint etc&#8230;</li>
</ul>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2019/05/Azure-MFA-All-Cloud-Apps.png" target="_blank" rel="noopener noreferrer"><img decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2019/05/Azure-MFA-All-Cloud-Apps.png" alt="Azure MFA All Cloud Apps" width="784" height="470" class="aligncenter size-full wp-image-2525" srcset="https://thesysadminchannel.com/wp-content/uploads/2019/05/Azure-MFA-All-Cloud-Apps.png?v=1605538472 784w, https://thesysadminchannel.com/wp-content/uploads/2019/05/Azure-MFA-All-Cloud-Apps-125x75.png?v=1605538472 125w, https://thesysadminchannel.com/wp-content/uploads/2019/05/Azure-MFA-All-Cloud-Apps-768x460.png?v=1605538472 768w" sizes="(max-width: 784px) 100vw, 784px" /></a><br />
&nbsp;</p>
<ul>
<li>Under <strong>Conditions</strong> -> <strong>Client Apps</strong> -> <strong>Configure</strong> -> Select Yes to Enable</li>
<li>I chose to select all client apps</li>
</ul>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2019/05/Azure-MFA-Enable-Conditions.png" target="_blank" rel="noopener noreferrer"><img decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2019/05/Azure-MFA-Enable-Conditions.png" alt="Azure MFA Enable Conditions" width="933" height="579" class="aligncenter size-full wp-image-2526" srcset="https://thesysadminchannel.com/wp-content/uploads/2019/05/Azure-MFA-Enable-Conditions.png?v=1605538839 933w, https://thesysadminchannel.com/wp-content/uploads/2019/05/Azure-MFA-Enable-Conditions-768x477.png?v=1605538839 768w" sizes="(max-width: 933px) 100vw, 933px" /></a><br />
&nbsp;</p>
<ul>
<li>Finally Under <strong>Access Control</strong>: Specify <strong>Grant Access</strong> </li>
<li><strong>Require multi-factor authentication</strong></li>
<li>Under <strong>Multiple Controls</strong>: Select <strong>Require one of the selected controls</strong></li>
</ul>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2019/05/MFA-Grant-User-Access-Control-Updated.png" target="_blank" rel="noopener noreferrer"><img decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2019/05/MFA-Grant-User-Access-Control-Updated.png" alt="MFA Grant User Access Control-Updated" width="739" height="657" class="aligncenter size-full wp-image-2528" /></a><br />
&nbsp;</p>
<h2>User Experience When Enrolling in Multi-Factor Authentication (MFA) </h2>
<p>As important as it is to require MFA for your users, it is equally important to make sure they understand the process and have a good user experience.  A good user experience will help adoption rates which will probably lead to less tickets in your queue (hopefully).</p>
<p>In any event, during my testing I noticed that it took a while to get prompted for MFA registration. I think that&#8217;s because it was evaluating the policies, but it took somewhere between 15-30 minutes after everything was setup.  Let&#8217;s see what the user will experience on their end.</p>
<p>&nbsp;</p>
<ul>
<li>Once a user hits an app that requires MFA, they will be prompted with this message box: </li>
<li><strong>More information required. Your organization needs more information to keep your account secure</strong></li>
</ul>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2019/10/User-Experience-Require-MFA.png" target="_blank" rel="noopener noreferrer"><img decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2019/10/User-Experience-Require-MFA.png" alt="User Experience - Require MFA" width="538" height="488" class="aligncenter size-full wp-image-1697" /></a><br />
&nbsp;</p>
<ul>
<li>Download the <strong>Microsoft Authenticator App</strong> on your smart phone device</li>
<li>In the dropdown, select <strong>Mobile App</strong> for your contact method</li>
<li>Select the radio button to <strong>receive notifications for verification</strong></li>
<li><strong>Click Setup</strong></li>
<li>Follow the prompts to complete</li>
</ul>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2019/10/User-Experience-Additional-MFA-Setup-Info.png" target="_blank" rel="noopener noreferrer"><img decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2019/10/User-Experience-Additional-MFA-Setup-Info.png" alt="User Experience - Additional MFA Setup Info - Deploy MFA Using Azure AD Conditional Access" width="962" height="500" class="aligncenter size-full wp-image-1699" srcset="https://thesysadminchannel.com/wp-content/uploads/2019/10/User-Experience-Additional-MFA-Setup-Info.png?v=1571603591 962w, https://thesysadminchannel.com/wp-content/uploads/2019/10/User-Experience-Additional-MFA-Setup-Info-768x399.png?v=1571603591 768w" sizes="(max-width: 962px) 100vw, 962px" /></a><br />
&nbsp;</p>
<ul>
<li>After you&#8217;ve successfully registered, you can now approve sign in requests</li>
</ul>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2019/10/User-Experience-Approve-Sign-in-Request.png" target="_blank" rel="noopener noreferrer"><img decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2019/10/User-Experience-Approve-Sign-in-Request.png" alt="User Experience - Approve Sign in Request" width="652" height="449" class="aligncenter size-full wp-image-1701" /></a></p>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2019/10/User-Experience-Approve-Sign-in-Request-from-Phone.jpg" target="_blank" rel="noopener noreferrer"><img decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2019/10/User-Experience-Approve-Sign-in-Request-from-Phone.jpg" alt="User Experience - Approve Sign in Request from Phone" width="543" height="285" class="aligncenter size-full wp-image-1702" /></a><br />
&nbsp;</p>
<h2>Video Demo: How To Enable Azure MFA Using Conditional Access</h2>
<p><iframe title="Deploy MFA Using Azure Conditional Access Policies" width="640" height="360" src="https://www.youtube.com/embed/q8rLQpOxDqI?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>Hopefully this step by step guide was helpful enough to Deploy MFA Using Azure AD Conditional Access for your environment.  </p>
<p>The post <a href="https://thesysadminchannel.com/deploy-mfa-using-azure-ad-conditional-access/">Deploy MFA Using Azure AD Conditional Access</a> appeared first on <a href="https://thesysadminchannel.com">the Sysadmin Channel</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://thesysadminchannel.com/deploy-mfa-using-azure-ad-conditional-access/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1668</post-id>	</item>
	</channel>
</rss>
