Skip to main content

💼 6.2.5 Ensure that multifactor authentication is required for risky sign-ins (Manual)

  • ID: /frameworks/cis-azure-v4.0.0/06/02/05

Description​

Entra ID tracks the behavior of sign-in events. If the Entra ID domain is licensed with P2, the sign-in behavior can be used as a detection mechanism for additional scrutiny during the sign-in event. If this policy is set up, then Risky Sign-in events will prompt users to use multi-factor authentication (MFA) tokens on login for additional verification.

Similar​

  • Sections
    • /frameworks/cis-azure-v3.0.0/02/02/06

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 CIS Azure v3.0.0 → 💼 2.2.6 Ensure Multi-factor Authentication is Required for Risky Sign-ins (Manual)no data

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 CIS Azure v3.0.0 → 💼 2.2.6 Ensure Multi-factor Authentication is Required for Risky Sign-ins (Manual)no data
💼 CIS Azure v5.0.0 → 💼 5.2.5 Ensure that multifactor authentication is required for risky sign-ins (Manual)1no data

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance