Events
9 Apr, 3 pm - 10 Apr, 12 pm
Code the Future with AI and connect with Java peers and experts at JDConf 2025.
Register NowThis browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Note
The Microsoft managed value for Authenticator Lite will move from disabled to enabled on June 26th, 2023. All tenants left in the default state Microsoft managed will be enabled for the feature on June 26th.
Microsoft Entra ID adds and improves security features to better protect customers against increasing attacks. As new attack vectors become known, Microsoft Entra ID can respond by enabling protection by default to help customers stay ahead of emerging security threats.
For example, in response to increasing MFA fatigue attacks, Microsoft recommended ways for customers to defend users. One recommendation to prevent users from accidental multifactor authentication (MFA) approvals is to enable number matching. As a result, default behavior for number matching will be explicitly Enabled for all Microsoft Authenticator users. You can learn more about new security features like number matching in our blog post Advanced Microsoft Authenticator security features are now generally available!.
There are two ways for protection of a security feature to be enabled by default:
Note
Only a critical security feature will have protection enabled by default.
Number matching is a good example of protection for an authentication method that is currently optional for push notifications in Microsoft Authenticator in all tenants. Customers could choose to enable number matching for push notifications in Microsoft Authenticator for users and groups, or they could leave it disabled. Number matching is already the default behavior for passwordless notifications in Microsoft Authenticator, and users can't opt out.
As MFA fatigue attacks rise, number matching becomes more critical to sign-in security. As a result, Microsoft will change the default behavior for push notifications in Microsoft Authenticator.
In addition to configuring Authentication methods policy settings to be either Enabled or Disabled, IT admins can configure some settings in the Authentication methods policy to be Microsoft managed. A setting that is configured as Microsoft managed allows Microsoft Entra ID to enable or disable the setting.
The option to let Microsoft Entra ID manage the setting is a convenient way for an organization to allow Microsoft to enable or disable a feature by default. Organizations can more easily improve their security posture by trusting Microsoft to manage when a feature should be enabled by default. By configuring a setting as Microsoft managed (named default in Graph APIs), IT admins can trust Microsoft to enable a security feature they haven't explicitly disabled.
For example, an admin can enable location and application name in push notifications to give users more context when they approve MFA requests with Microsoft Authenticator. The additional context can also be explicitly disabled, or set as Microsoft managed. Today, the Microsoft managed configuration for location and application name is Disabled, which effectively disables the option for any environment where an admin chooses to let Microsoft Entra ID manage the setting.
As the security threat landscape changes over time, Microsoft can change the Microsoft managed configuration for location and application name to Enabled. For customers who want to rely upon Microsoft to improve their security posture, setting security features to Microsoft managed is an easy way stay ahead of security threats. They can trust Microsoft to determine the best way to configure security settings based on the current threat landscape.
The following table lists each setting that can be set to Microsoft managed and whether that setting is enabled or disabled by default.
Setting | Configuration |
---|---|
Registration campaign | Enabled for text message and voice call users |
Location in Microsoft Authenticator notifications | Disabled |
Application name in Microsoft Authenticator notifications | Disabled |
System-preferred MFA | Enabled |
Authenticator Lite | Enabled |
Report suspicious activity | Disabled |
As threat vectors change, Microsoft Entra ID can announce default protection for a Microsoft managed setting in release notes and on commonly read forums like Tech Community.
For more information, see our blog post It's Time to Hang Up on Phone Transports for Authentication which discusses moving away from using text message and voice calls. This change leads to default enablement for the registration campaign to help users set up Authenticator for modern authentication.
Authentication methods in Microsoft Entra ID - Microsoft Authenticator
Events
9 Apr, 3 pm - 10 Apr, 12 pm
Code the Future with AI and connect with Java peers and experts at JDConf 2025.
Register NowTraining
Module
Improve sign-in security with Microsoft Authenticator - Training
Improve Microsoft Entra sign-in security by running a registration campaign to nudge users to set up Microsoft Authenticator push notifications as their default sign-in method.
Certification
Microsoft Certified: Identity and Access Administrator Associate - Certifications
Demonstrate the features of Microsoft Entra ID to modernize identity solutions, implement hybrid solutions, and implement identity governance.
Documentation
System-preferred multifactor authentication (MFA) - Microsoft Entra ID
Learn how to use system-preferred multifactor authentication
How to run a registration campaign to set up Microsoft Authenticator - Microsoft Entra ID
Learn how to move your organization away from less secure authentication methods to Microsoft Authenticator
Microsoft Entra multifactor authentication overview - Microsoft Entra ID
Learn how Microsoft Entra multifactor authentication helps safeguard access to data and applications while meeting user demand for a simple sign-in process.