💼 2.2.6 Ensure Multi-factor Authentication is Required for Risky Sign-ins (Manual)
- ID:
/frameworks/cis-azure-v3.0.0/02/02/06
Description​
Entra ID tracks the behavior of sign-in events. If the Entra ID domain is licensed with P2, the sign-in behavior can be used as a detection mechanism for additional scrutiny during the sign-in event. If this policy is set up, then Risky Sign-in events will prompt users to use multi-factor authentication (MFA) tokens on login for additional verification.
Similar​
- Sections
/frameworks/cis-azure-v2.1.0/01/02/05/frameworks/cis-azure-v4.0.0/06/02/05
Similar Sections (Take Policies From)​
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 CIS Azure v2.1.0 → 💼 1.2.5 Ensure Multi-factor Authentication is Required for Risky Sign-ins - Level 1 (Manual) | no data | ||||
| 💼 CIS Azure v4.0.0 → 💼 6.2.5 Ensure that multifactor authentication is required for risky sign-ins (Manual) | no data |
Similar Sections (Give Policies To)​
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 CIS Azure v2.1.0 → 💼 1.2.5 Ensure Multi-factor Authentication is Required for Risky Sign-ins - Level 1 (Manual) | no data | ||||
| 💼 CIS Azure v4.0.0 → 💼 6.2.5 Ensure that multifactor authentication is required for risky sign-ins (Manual) | no data | ||||
| 💼 CIS Azure v5.0.0 → 💼 5.2.5 Ensure that multifactor authentication is required for risky sign-ins (Manual) | 1 | no data |
Sub Sections​
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|