Exercise - Configure security settings

Completed

Contoso's security policy requires all user accounts to use multi-factor authentication (MFA). Instead of just offering email or over-the-phone verification, you should enable a second method as an alternative.

In order to always keep its users protected throughout, it's important to follow the order of changing the settings. First, the dynamic group was created. This group doesn't contain any users yet, but this will change with the next exercise. This dynamic group can then be used in the next step when creating a conditional access policy. By excluding the group, meeting room resource accounts are excluded from MFA requirements.

Afterward, the security defaults can be deactivated and changed to user defined and a second MFA method can be activated.

Setup Microsoft Entra Conditional Access

Due to Contoso Ltd.'s compliance policy, all users need to use MFA. Because Microsoft Teams Room accounts currently don't support MFA, you need to create an exclusion for these accounts with a Conditional Access Policy.

  1. As the Global Administrator (globalAdmin@<tenant>.onmicrosoft.com), navigate to the Azure portal and go to Microsoft Entra Conditional Access.

  2. Create a new Conditional Access Policy that includes all users. In the Exclude tab, select Users or groups and select the previous created group for MTR accounts TeamsRoomsAccounts_dynamic.

  3. At Cloud apps or actions select All cloud apps

  4. At Grant in the menu of Access control, select Require multi-factor authentication.

  5. Save your settings and enable the policy.

    Screenshot of setting up the conditional access policy in the Azure portal.

  6. Disable Security default settings

    1. In the Azure portal logged in as Global Admin, below Properties, select Manage security defaults.

    2. To be allowed to create and setup other security features, you need to set the Security defaults value to Disabled.

      Screenshot when disabling the security defaults in the Azure portal.

  7. Allow the Microsoft Authenticator App as authentication method

    1. In the Microsoft Entra admin center, go to Security and open Authentication methods.

    2. Add Microsoft Authenticator as a second method for MFA.

      Screenshot after adding Microsoft Authenticator as an alternate MFA method in the Azure portal.