Are you using Azure? If so here is the guide I made to do this.
Sign in to the Azure Portal: Head over to portal.azure.com and log in with your admin account.
- Navigate to Azure Active Directory: On the left-hand side, click on "Azure Active Directory."
- Set Up Conditional Access:
- Under "Security," select "Conditional Access."
- Click "New policy" to start creating a new one.
- Name Your Policy: Give your policy a straightforward name like "Office Network - No MFA."
- Assign Users and Groups:
- Under "Assignments," go to "Users and groups."
- Choose the users or groups that should be exempt from MFA. You can pick all users or specific groups.
- Configure Cloud Apps:
- Under "Assignments," select "Cloud apps or actions."
- Choose which applications this policy should cover. This could be all cloud apps or just specific ones.
- Set Conditions:
- Under "Conditions," select "Locations."
- Switch "Configure" to "Yes."
- In "Include," select "Any location."
- In "Exclude," choose "Selected locations."
- Pick the locations representing your office network. If you haven’t set these up yet, you can add your office IP address ranges here.
- Define Access Controls:
- Under "Access controls," click "Grant."
- Set it to "Require multi-factor authentication" and then switch MFA to "On."
- Enable Your Policy: Turn the policy "On" and save it.