π Microsoft Entra ID Non-Privileged User Multi-Factor Auth Status is not enabled π’
- Contextual name: π Non-Privileged Users Multi-Factor Auth Status is not enabled π’
- ID:
/ce/ca/azure/microsoft-entra-id/non-privileged-users-multi-factor-auth-status
- Located in: π Microsoft Entra ID
Flagsβ
- π’ Impossible policy
- π’ Policy with categories
- π’ Policy with type
Our Metadataβ
- Policy Type:
COMPLIANCE_POLICY
- Policy Category:
SECURITY
Similar Policiesβ
- Cloud Conformity
Descriptionβ
Descriptionβ
[IMPORTANT - Please read the section overview: If your organization pays for Microsoft Entra ID licensing (included in Microsoft 365 E3, E5, or F5, and EM&S E3 or E5 licenses) and CAN use Conditional Access, ignore the recommendations in this section and proceed to the Conditional Access section.]
Enable multi-factor authentication for all non-privileged users.
Rationaleβ
Multi-factor authentication requires an individual to present a minimum of two separate forms of authentication before access is granted. Multi-factor authentication provides additional assurance that the individual attempting to gain access is who they claim to be. With multi-factor authentication, an attacker would need to compromise at least two different authentication mechanisms, increasing the difficulty of compromise and thus reducing the risk.
Impactβ
Users would require two forms of authentication before any access is granted. Also, this requires an overhead for managing dual forms of authentication.
Auditβ
From Azure Portalβ
... see more
Remediationβ
Remediationβ
From Azure Portalβ
- From Azure Home select the Portal Menu.
- Select
Microsoft Entra ID
blade.- Under
Manage
, clickUsers
.- Click on the
Per-User MFA
button in the top row menu.- Check the box next to each user.
- Click
Enable MFA
.- Click
Enable
.Other Options within Azure Portalβ
Follow Microsoft Azure documentation and enable multi-factor authentication in your environment.
Enabling and configuring MFA is a multi-step process. Here are some additional resources on the process within Microsoft Entra ID:
- https://learn.microsoft.com/en-us/entra/identity/conditional-access/howto-conditional-access-policy-admin-mfa
- https://learn.microsoft.com/en-us/entra/identity/authentication/howto-mfa-getstarted#enable-multi-factor-authentication-with-conditional-access
- https://learn.microsoft.com/en-us/entra/identity/authentication/howto-mfa-mfasettings
policy.yamlβ
Linked Framework Sectionsβ
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
πΌ CIS Azure v2.1.0 β πΌ 1.1.3 Ensure that 'Multi-Factor Auth Status' is 'Enabled' for all Non-Privileged Users - Level 2 (Manual) | 1 | |||
πΌ CIS Azure v3.0.0 β πΌ 2.1.3 Ensure that 'Multi-Factor Auth Status' is 'Enabled' for all Non-Privileged Users (Manual) | 1 | |||
πΌ Cloudaware Framework β πΌ Multi-Factor Authentication (MFA) Implementation | 16 |