🛡️ Microsoft Entra ID MFA to access Microsoft Admin Portals is not required🟢⚪
- Contextual name: 🛡️ MFA To Access Microsoft Admin Portals is not required🟢⚪
- ID:
/ce/ca/azure/microsoft-entra-id/mfa-to-access-microsoft-admin-portals - Tags:
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Description
Description
This recommendation ensures that users accessing Microsoft Admin Portals (e.g., Microsoft 365 Admin, Microsoft 365 Defender, Exchange Admin Center, Azure portal) are required to use multi-factor authentication (MFA) when logging in to an admin portal.
Rationale
Administrative portals for Microsoft Azure should be secured with a higher level of scrutiny for authentication mechanisms. Enabling multi-factor authentication is recommended to reduce the potential for abuse of administrative actions and to prevent intruders or compromised admin credentials from changing administrative settings.
Important: While this recommendation allows exceptions to specific users or groups, they should be carefully tracked and reviewed for necessity on a regular interval through an access review process. It is important that this rule includes
All Usersto ensure that all users not specifically excepted are required to use MFA to access admin portals.Impact
Conditional Access policies require Microsoft Entra ID P1 or P2 licenses. Similarly, they may require additional overhead to maintain if users lose access to their MFA. Any users or groups which are granted an exception to this policy should be carefully tracked, be granted only minimal necessary privileges, and conditional access exceptions should be reviewed or investigated.
... see more
Remediation
Remediation
From Azure Portal
- From the Azure Admin Portal dashboard, open
Microsoft Entra ID.- Click
Securityin the Entra ID blade.- Click
Conditional Accessin the Security blade.- Click
Policiesin the Conditional Access blade.- Click
+ New policy.- Enter a name for the policy.
- Click the blue text under
Users.- Under
Include, selectAll users.- Under
Exclude, checkUsers and groups.- Select users or groups to be exempted from this policy (e.g., break-glass emergency accounts and non-interactive service accounts), then click
Select.- Click the blue text under
Target Resources.- Under
Include, click theSelect appsradio button.- Click the blue text under
Select.- Check the box next to
Microsoft Admin Portals, then clickSelect.- Click the blue text under
Grant.- Under
Grant access, check the box forRequire multifactor authentication, then clickSelect.- Before creating, set
Enable policytoReport-only.- Click
Create.After testing the policy in report-only mode, update the
Enable policysetting fromReport-onlytoOn.
policy.yaml
Linked Framework Sections
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 CIS Azure v5.0.0 → 💼 5.2.7 Ensure that multifactor authentication is required to access Microsoft Admin Portals (Manual) | 1 | no data | |||
| 💼 Cloudaware Framework → 💼 Multi-Factor Authentication (MFA) Implementation | 18 | no data |