Back to Blog
Microsoft 365 Multi-Factor Authentication Cybersecurity IT Security

Setting Up Multi-Factor Authentication for Microsoft 365

By Ash Ganda | 22 March 2023 | 7 min read

Setting Up Multi-Factor Authentication for Microsoft 365

Multi-factor authentication is the single most impactful security measure you can implement for your Microsoft 365 environment. Microsoft reports that MFA blocks more than 99.9 percent of account compromise attacks. Yet many Australian businesses still have not enabled it.

If your business uses Microsoft 365 without MFA, every account is protected only by a password. Given that password reuse, phishing, and credential stuffing attacks are rampant, this is a significant risk that can be addressed today.

This guide walks you through the process of enabling MFA for your Australian business, from the simplest approach to more advanced configurations.

Understanding Your MFA Options

Microsoft 365 offers three approaches to MFA, each suited to different business needs:

1. Security Defaults

What it is: A pre-configured set of security settings that Microsoft recommends for all organisations. Enabling Security Defaults turns on MFA for all users with a simple toggle.

Best for: Small businesses (under 50 users) on Microsoft 365 Business Basic, Business Standard, or similar plans that do not have Azure AD Premium licences.

Limitations:

  • All-or-nothing approach (cannot exclude specific users)
  • Uses Microsoft Authenticator app as the primary method
  • Cannot customise policies (no location-based or device-based exceptions)
  • Incompatible with Conditional Access policies

2. Per-User MFA

What it is: Enable MFA on a user-by-user basis through the legacy MFA management portal. Each user is set to Disabled, Enabled, or Enforced.

Understanding Your MFA Options Infographic

Best for: Organisations that need to roll out MFA gradually to specific users.

Limitations:

  • Manual management for each user
  • Limited flexibility (no conditional policies)
  • Microsoft recommends Security Defaults or Conditional Access over per-user MFA

3. Conditional Access Policies

What it is: Granular policies that require MFA based on specific conditions such as user role, device compliance, location, application, and risk level.

Best for: Businesses on Microsoft 365 Business Premium or higher that need flexible, condition-based MFA enforcement.

Requirements: Azure AD Premium P1 licence (included in Microsoft 365 Business Premium, E3, and E5).

Advantages:

  • Require MFA only when specific conditions are met
  • Exempt trusted locations (your office network) from MFA prompts
  • Require compliant devices for access
  • Different policies for different user groups
  • Block access entirely in high-risk scenarios

Method 1: Enabling Security Defaults

This is the quickest way to enable MFA for your entire organisation.

Step-by-Step

  1. Sign in to the Azure portal (portal.azure.com) with a Global Administrator account
  2. Navigate to Azure Active Directory
  3. Select Properties from the left menu
  4. Scroll to the bottom and click “Manage Security Defaults”
  5. Set “Enable Security Defaults” to Yes
  6. Click Save

What Happens Next

  • All users will be prompted to register for MFA within 14 days of their next sign-in
  • Users will be required to use the Microsoft Authenticator app or another supported method
  • Legacy authentication protocols (POP3, IMAP, SMTP basic auth) will be blocked
  • Administrators will be required to perform MFA on every sign-in

Communicating to Your Team

Before enabling Security Defaults, notify your staff. Send a communication that covers:

Method 1: Enabling Security Defaults Infographic

  • What MFA is and why it matters
  • That they will be prompted to set up MFA on their next sign-in
  • Instructions for installing Microsoft Authenticator on their phone (available on iOS and Android)
  • Who to contact if they have questions or issues
  • A timeline (e.g., “Starting Monday, you will be prompted to set up MFA”)

Sample communication:

Subject: Important Security Update — Multi-Factor Authentication

Team,

To protect our business from cyber threats, we are enabling multi-factor authentication (MFA) on our Microsoft 365 accounts starting [date].

What this means: When you sign in, you will occasionally be asked to verify your identity using your mobile phone, in addition to your password. This adds a critical layer of security to your account.

What you need to do:

  1. Install the Microsoft Authenticator app on your phone from the App Store or Google Play
  2. When you next sign in to Microsoft 365, follow the prompts to set up MFA
  3. Keep your phone accessible when signing in to Microsoft services

If you have any questions, please contact [IT support contact].

This change protects both your personal information and our business data.

Method 2: Per-User MFA

If you need to enable MFA for specific users rather than the entire organisation:

Step-by-Step

  1. Sign in to the Microsoft 365 admin centre (admin.microsoft.com)
  2. Navigate to Users, then Active Users
  3. Click “Multi-factor authentication” in the top menu (or select “Per-user MFA” from the menu)
  4. You will see a list of all users with their MFA status
  5. Select the user(s) you want to enable
  6. Click “Enable” in the right panel
  7. Confirm the action

MFA Status Meanings

Method 2: Per-User MFA Infographic

  • Disabled: MFA is not enabled for the user
  • Enabled: The user has been enrolled but has not completed MFA registration. They will be prompted on next sign-in.
  • Enforced: The user has completed registration and must use MFA for all sign-ins.

After a user completes their MFA setup, their status automatically changes from Enabled to Enforced.

Rollout Strategy

For a phased rollout:

Week 1: Enable MFA for IT administrators and Global Admins (highest-risk accounts)

Week 2: Enable MFA for finance and management staff (access to sensitive financial data)

Week 3: Enable MFA for all remaining staff

Week 4: Verify all users are in Enforced status and address any holdouts

Method 3: Conditional Access Policies

For businesses with Azure AD Premium P1 (included in Microsoft 365 Business Premium):

Prerequisites

  • Disable Security Defaults first (Security Defaults and Conditional Access are mutually exclusive)
  • Ensure you have Azure AD Premium P1 licences assigned to users
  • Identify your trusted office locations (IP addresses)

Creating a Basic MFA Policy

  1. Sign in to the Azure portal (portal.azure.com)
  2. Navigate to Azure Active Directory, then Security, then Conditional Access
  3. Click “New policy”
  4. Name the policy: “Require MFA for all users”
  5. Assignments - Users: Select “All users.” Exclude a break-glass emergency access account (see below).
  6. Assignments - Cloud apps: Select “All cloud apps”
  7. Conditions: Leave default (all conditions)
  8. Access controls - Grant: Select “Require multi-factor authentication”
  9. Set the policy to “Report-only” first to evaluate impact
  10. After reviewing the report-only results for a few days, switch to “On”

Creating a Location-Based Policy

Method 3: Conditional Access Policies Infographic

To skip MFA when users are in your office:

  1. First, create a Named Location:

    • Go to Azure AD, Security, Conditional Access, Named Locations
    • Click “New location”
    • Name it (e.g., “Sydney Office”)
    • Enter your office’s public IP address or range
    • Mark it as a trusted location
  2. Then modify your MFA policy:

    • Edit the MFA policy
    • Under Conditions, select Locations
    • Set “Configure” to Yes
    • Under Exclude, select your trusted office location
    • Save

Now users in the office connect without MFA prompts, but remote users must complete MFA. This balances security with user convenience.

Emergency Break-Glass Account

Always maintain at least one emergency access account that is excluded from Conditional Access policies. This account ensures you can access your tenant if MFA or Conditional Access has issues.

Best practices for the break-glass account:

  • Use a long, complex password (30 or more characters)
  • Store the password securely (printed and locked in a safe, not digital)
  • Do not assign it to a specific person
  • Monitor sign-ins to this account with alerts
  • Exclude it from all Conditional Access policies
  • Test it periodically to ensure it works

Choosing MFA Methods

Microsoft 365 supports several MFA verification methods:

The most secure and convenient method. Users approve sign-in requests with a tap on their phone. Supports number matching for additional security.

SMS Verification

A code is sent via text message. Convenient but less secure than the Authenticator app due to SIM-swapping risks. The ACSC advises against relying solely on SMS for MFA.

Phone Call

An automated call asks the user to press a key to verify. Similar security concerns as SMS.

FIDO2 Security Keys

Physical hardware keys (such as YubiKey) that provide the strongest MFA. Ideal for administrator accounts and high-security environments. Cost AUD 50 to 100 per key.

Windows Hello for Business

Biometric (fingerprint or facial recognition) or PIN-based authentication for Windows devices. Strong security with excellent user experience.

Recommendation for Australian SMBs: Make Microsoft Authenticator the default method. For administrator accounts, consider FIDO2 security keys as an additional measure.

Troubleshooting Common Issues

”I forgot my phone”

If a user cannot access their MFA method:

  • Administrators can temporarily reset their MFA registration
  • Implement alternative methods (office phone as backup)
  • For Conditional Access, consider a temporary exemption policy

Legacy Applications Breaking

Some older applications do not support modern authentication and will break when legacy authentication is blocked. Common examples:

  • Older email clients (Outlook 2010 and earlier)
  • Some multifunction printers that scan to email
  • Legacy line-of-business applications using basic SMTP

Solutions:

  • Upgrade to current software versions that support modern authentication
  • For printers and scanners, create app passwords or configure SMTP relay through Exchange Online
  • For legacy applications, evaluate alternatives or create specific Conditional Access exceptions (with compensating controls)

User Resistance

Some staff will resist MFA as inconvenient. Address this by:

  • Explaining the security risks (use Australian breach examples)
  • Demonstrating that MFA prompts are infrequent (especially with trusted locations)
  • Highlighting that their personal accounts are also at risk without MFA
  • Making it a policy requirement, not optional

After Enabling MFA

Monitor and Report

  • Review the Azure AD sign-in logs for MFA-related failures
  • Check the MFA registration report to confirm all users have registered
  • Monitor for accounts still using legacy authentication

Regular Maintenance

  • Onboarding: Include MFA setup in your new starter process
  • Offboarding: MFA registration is automatically removed with the account
  • Device changes: Users can update their MFA methods at aka.ms/mfasetup
  • Periodic review: Verify MFA policies remain effective and adjust as your environment changes

Next Steps After MFA

MFA is your foundation. Build on it with:

  • Conditional Access policies for granular control
  • Device compliance requirements
  • Application protection policies
  • Security awareness training for staff
  • Regular phishing simulation exercises

MFA is not a silver bullet, but it is the closest thing cybersecurity has to one. For Australian businesses using Microsoft 365, there is no valid reason not to enable it today. The process takes an hour to implement, and the security benefit is transformative.

Ready to transform your business?

Let's discuss how AI and cloud solutions can drive your digital transformation. Our team specializes in helping Australian SMBs implement cost-effective technology solutions.

Bella Vista, Sydney