Office 365 MFA disable external access if not enforced

John D 36 Reputation points
2021-03-09T16:02:06.327+00:00

So there are three MFA settings. Disabled, Enabled and enforced. Enabled is set and then the user can authenticate using only name and password at which point they have to enroll in the MFA process.

We have 100% requirement that all users have MFA enabled. Unfortunately some of them don't complete this process because they never check email outside the company.

Is there a setting that I can disable authentication from ALL users that have disabled, or enabled, set for MFA UNLESS the request comes from an IP that is on the trusted IP list. This will ensure that no authentication requests are accepted from OUTSIDE the corporate network that are for users that do not have MFA enforced meaning they have completed the enrollment process.

Thanks John

Microsoft Security | Microsoft Entra | Microsoft Entra ID
0 comments No comments
{count} votes

6 answers

Sort by: Most helpful
  1. Vasil Michev 119.5K Reputation points MVP Volunteer Moderator
    2021-03-09T20:56:09.24+00:00

    Set it to Enforced if you want them to go over the registration policy. Or better yet, toggle Security defaults on.

    1 person found this answer helpful.
    0 comments No comments

  2. John D 36 Reputation points
    2021-03-10T11:25:45.903+00:00

    Unfortunately, that does not answer my question at all.

    Enabled or enforced still allows authentication until the registration process has been completed. Therefore the users that are using outlook inside the trusted IP network are never prompted or have to complete the registration process. This means that a would be hacker can still authenticate from outside the network without having to enter MFA because MFA process has not been completed. In fact - if he gained access - he could complete the MFA process using his own cell or whatever.

    toggle Security defaults on? that sounds intriguing but I have no idea what security defaults you are referring to.

    I would think this would be a common sense flag that could be set

    Disable access for any user that does not have MFA registration complete unless coming from a trusted IP. Thats what I would like to do - how does one accomplish that?

    Thanks
    John

    1 person found this answer helpful.

  3. John D 36 Reputation points
    2021-03-10T12:28:09.237+00:00

    Will do - I have a ticket open with our Azure escalation support partner to see if they can help me figure out why its not applying.

    Thanks
    John

    1 person found this answer helpful.

  4. John D 36 Reputation points
    2021-03-10T11:28:29.973+00:00

    https://learn.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-userstates

    "The user is enrolled per-user in Azure AD Multi-Factor Authentication. If the user hasn't yet registered authentication methods, they receive a prompt to register the next time they sign in using modern authentication (such as via a web browser). Users who complete registration while in the Enabled state are automatically moved to the Enforced state."

    0 comments No comments

  5. Himanshu Ahuja 1 Reputation point
    2021-03-10T11:39:00.307+00:00

    What about a conditional access policy to grant access only if MFA is enforced.
    As per my understanding, you should be able to create a policy with a check mark for "Require multi-factor authentication"

    You can also add conditions of trusted locations at the same time.
    With that I have witnessed, this makes sure any user will be granted access only when MFA is enforced. (Yes I know enforced is not the same as enabled :) )

    Please let me know if this helps or not, I am testing a few things and if I come across something else, will surely update here.

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.