Hi @Jared ,
Thanks for the question and using MS Q&A platform.
To set up a Conditional Access policy for MFA compliance in Microsoft Entra ID, make sure you have the right license, like the Entra ID Premium P1 or P2 plan. If you're having issues with your Azure account and email recognition for the trial, you might need to contact Microsoft support to upgrade your account instead of creating a new one.
Once you've got the right plan, follow these easy steps to create a Conditional Access policy:
Sign in to the Microsoft Entra admin center. Go to Protection > Conditional Access > Policies. Click on + New policy to create a new policy. Name it (e.g., "MFA Compliance Policy"). Under Assignments, select Users or workload identities and choose who this policy will affect. Under Cloud apps or actions, pick the apps that will need MFA. In Access controls, select Grant and then choose Require multifactor authentication. Finally, enable the policy and save your changes.
If you're still feeling stuck, consider reaching out to your IT support or a knowledgeable colleague for help.
Tutorial: Migrate Okta sign-on policies to Microsoft Entra Conditional Access
Require MFA for Azure management
Plan a Microsoft Entra multifactor authentication deployment
If the answer is helpful, please click Accept Answer and kindly upvote it so that other people who faces similar issue may get benefitted from it.