Except, now as a global admin, you can't even get to protection unless YOU YOURSELF have MS AUTHENTICATOR. There really is no way around it. I spent 7 hours yesterday working in my own personal tenancy and several customer tenant portals. This is a disaster. It doesn't help that they are constantly moving things in the admin portal.
I any case setting the STATE to DISABLED simply leaves the user accounts in the same state (requiring MFA even though modern and 2FA are both disabled on the tenant) but with NO auth method. The catch 22 is that now one can't be added with out re-enabling the policy, but no matter what method you setup as the default, MS authenticator takes precedent.
App passwords are broken - can't even be added anymore and it appears that whatever they have done to override the admin portal Modern/2FA/Per User security settings has made a mess everywhere and broken other settings in many other places.
Add to that the number of users who using any MS connected resource anywhere can accidentally end up with a "live" account associated to their work/school email, the insanity of OneDrive being almost impossible to block even in locked down AD environments, KiosK Mode in W11 lacking single APP and basically being impossible to lock down for no browser, etc. We won't even touch on the absurdity of trying to make a Windows machine actually even remotely HIPAA compliant. The forced Authenticator nonsense is basically the last straw for me.
I was a Microsoft Partner for decades. I am no longer and relish moving anything and everything that I can away from their platforms. I personally moved to a Mac ~5 years ago and will likely never own another Microsoft Desktop Operating system.