MFA registration and usage shall be periodically reviewed

Description

MFA registration should periodically be reviewed to ensure that there are no gaps or misconfigurations of deployment. MFA can be monitored natively within Azure Active Directory or with 3rd party tools.

Policy

  • MFA registration details and usage shall be monitored on a defined schedule.

Licensing Considerations

Viewing Authentication Activity in Azure AD requires an Azure AD P1 license which can be purchased standalone or through the following common plans:

  • Microsoft 365 Business Premium

  • EMS + E3 or EMS + E5

  • Microsoft 365 E3

  • Microsoft 365 E5

MFA reports can also be derived from PowerShell which does not require an Azure AD P1 license and can be used with any Microsoft licensing model

Set Up Instructions

To view the Authentication Activity: Authentication Methods Activity - Azure Active Directory - Microsoft Entra | Microsoft Learnarrow-up-right

Using the Azure AD sign-ins report: Sign-in event details for Azure AD Multi-Factor Authentication - Azure Active Directory - Microsoft Entra | Microsoft Learnarrow-up-right

Usage Graph API: List credentialUserRegistrationDetails - Microsoft Graph beta | Microsoft Learnarrow-up-right

End-User Impact

circle-info

Level: None

There is no end-user impact when looking at log information or reports on MFA.

circle-info

Tips

Try to review this information at least quarterly

The registration and reset eventsarrow-up-right of the Authentication methods section can also be used to investigate potential post-breach activity. Attackers sometimes reset MFA registration methods after accessing a compromised account.

PowerShell Scripts

MFA Status Reporting (Multi-tenant): Security/MFA Status_Custom Control_All Customers.ps1 at master · msp4msps/Security (github.com)arrow-up-right

Find Global Admins without MFA: Security/Customer-Global Admin without MFA.ps1 at master · msp4msps/Security (github.com)arrow-up-right

Videos

Last updated