Skip to main content

Repository → 💼 CIS Azure v4.0.0 → 💼 6 Identity Services → 💼 6.2 Conditional Access

💼 6.2.5 Ensure that multifactor authentication is required for risky sign-ins (Manual)

  • ID: /frameworks/cis-azure-v4.0.0/06/02/05

Description

Entra ID tracks the behavior of sign-in events. If the Entra ID domain is licensed with P2, the sign-in behavior can be used as a detection mechanism for additional scrutiny during the sign-in event. If this policy is set up, then Risky Sign-in events will prompt users to use multi-factor authentication (MFA) tokens on login for additional verification.

Similar

  • Sections
    • /frameworks/cis-azure-v3.0.0/02/02/06

Similar Sections (Take Policies From)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 CIS Azure v3.0.0 → 💼 2.2.6 Ensure Multi-factor Authentication is Required for Risky Sign-ins (Manual)1no data

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 CIS Azure v3.0.0 → 💼 2.2.6 Ensure Multi-factor Authentication is Required for Risky Sign-ins (Manual)1no data

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlagsCompliance

Policies (1)

PolicyLogic CountFlagsCompliance
🛡️ Microsoft Entra ID MFA For Risky Sign-Ins is not required🟢⚪🟢 x2, ⚪ x1no data