Share via

Entra External ID - Activate MFA for users and still use Microsoft default security settings

TECHZARD 0 Reputation points
2026-02-19T11:21:42.89+00:00

Hello,

We have implemented Entra External ID, but the users are not getting any MFA when logging in.

When locking at Entra External ID settings. It looks like there is a security policy in place which should activate MFA when considering a log in attempt to be suspicious. However, so far we have not been able to trigger MFA on any of our login attempts.

We are able to activate it to be active on every log in attempt, however this setting then says that we are going outside of Microsoft Standard security settings. And we would like it not to be happening every time.

We have tried to trigger the MFA using VPN and loging on from abroad. But still no success.

We would like to be within Microsoft standard security setting AND that MFA trigger when needed, but ideally not every login attempt (should be some time between it triggers the next time).

Microsoft Security | Microsoft Entra | Microsoft Entra External ID
{count} votes

1 answer

Sort by: Most helpful
  1. Q&A Assist
    2026-02-19T11:21:56.39+00:00
    AI generated content. This question contains an answer created with AI from Q&A Assist. Learn more

    To activate MFA for users in Microsoft Entra External ID while still adhering to Microsoft’s standard security settings, you can utilize the built-in security defaults. Security defaults require all users to register for Microsoft Entra multifactor authentication (MFA) and will prompt users for MFA based on risk factors such as location and device. However, if you want to avoid prompting for MFA on every login attempt, you may need to adjust your settings accordingly.

    Here are steps you can take:

    1. Enable Security Defaults: Ensure that security defaults are enabled in your Microsoft Entra ID settings. This will enforce MFA registration and prompt users for MFA when necessary without requiring it on every login.
    2. Conditional Access Policies: Consider creating Conditional Access policies that define specific conditions under which MFA is required. This allows you to set parameters such as location, device compliance, and risk level to determine when MFA should be triggered.
    3. Monitor Sign-in Activity: Use the Conditional Access insights and reporting workbook to analyze sign-in logs and understand how MFA is impacting your users. This can help you fine-tune your policies to balance security and user experience.
    4. Test Different Scenarios: Since you mentioned trying to trigger MFA using a VPN and logging in from abroad, ensure that your Conditional Access policies are configured to recognize these scenarios as risky. You may need to adjust the conditions under which MFA is prompted to ensure it activates under the desired circumstances.

    By implementing these strategies, you can maintain compliance with Microsoft’s standard security settings while still ensuring that MFA is triggered appropriately based on risk assessments.

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.