Manage multifactor authentication in Microsoft 365 Lighthouse
Azure Active Directory (Azure AD) Multi-Factor Authentication (MFA) helps safeguard access to data and applications, providing another layer of security by using a second form of authentication. The Multifactor Authentication page provides detailed information on the status of MFA enablement across your tenants. Select any tenant in the list to see more details for that tenant, including which Conditional Access policies requiring MFA are already configured and which users haven't yet registered for MFA.
For small- and medium-sized business (SMB) customers, Microsoft recommends enabling security defaults at a minimum. For more complex scenarios, you can use Conditional Access to configure specific policies.
Before you begin
The following conditions must be met before a tenant will appear in the list:
The customer tenant must have an Azure AD Premium license for each user. For more information on which licenses support MFA, see Features and licenses for Azure AD Multi-Factor Authentication.
The customer tenant must be active within Microsoft 365 Lighthouse. To learn how to determine if a tenant is active, see Microsoft 365 Lighthouse tenant list overview.
Enable MFA for a tenant
In the left navigation pane in Lighthouse, select Users > Multifactor authentication.
On the Multifactor Authentication page, look for a tenant currently not using MFA, and then select that tenant to open the tenant details pane.
On the MFA enablement tab, under MFA with Security defaults, select Enable Security defaults.
Select Save changes.
To enable MFA through Conditional Access, see Tutorial: Secure user sign-in events with Azure AD Multi-Factor Authentication.
Notify users who aren't registered for MFA
In the left navigation pane in Lighthouse, select Users > Multifactor authentication.
On the Multifactor Authentication page, look for tenants with users not registered for MFA, and then select the tenant to open the tenant details pane.
Select Users not registered for MFA tab.
Select all other users in the list who need to register for MFA, and then select Create email.
Tip
Select the Admin, Guest, or Members counts to filter the list by type. If any of the user accounts in the list are emergency access accounts or service accounts for which you don't want to require MFA, select those user accounts, and then select Exclude users. The excluded user accounts will no longer appear in the list of users not registered for MFA.
Note
If any shared mailbox accounts or inactive user accounts appear in the list of users not registered for MFA, we recommend that you block signin for those accounts so they'll no longer appear in this list.
Lighthouse opens your default email client and prepopulates the email message with instructions to register for MFA. All the selected users will be included on the BCC line. If you prefer to individually email users, you can select the email icon next to the username.
If you want to use a different email account, you can export the list of users to a file. You can also download sample email templates that you can customize with your company branding.
Next steps
Once MFA is enabled, you can enable Azure Active Directory (Azure AD) self-service password reset. This feature gives users the ability to change or reset their password with no administrator or help desk involvement. For more information, see Manage self-service password reset in Microsoft 365 Lighthouse.
Related content
Plan an Azure Active Directory Multi-Factor Authentication deployment (article)
What are security defaults? (article)
What is Conditional Access? (article)
Learn how to convert users from per-user MFA to Conditional Access (article)
Feedback
Submit and view feedback for