Skip to content
English
  • There are no suggestions because the search field is empty.

Phishing-resistant MFA for Admins [CHK-1171]

This check verifies if phishing-resistant multi-factor authentication (MFA) is enforced for administrators.

Rationale

Admin accounts are prime targets for attackers who actively try to bypass MFA. Implementing phishing-resistant MFA methods, although less user-friendly or more expensive, significantly enhances the security of these accounts.

Fix

An automated fix is available through Attic. This fix creates a report-only policy initially, allowing you to review which admins would be affected by the policy. The policy is then changed to 'enabled' to enforce it.

To fix it yourself:

  1. Navigate to Entra ID portal at https://entra.microsoft.com
  2. Go to Conditional Access > Policies
  3. Click "New policy"
  4. Name the policy (e.g., "Require phishing-resistant MFA for admins")
  5. Under "Assignments > Users", select "Directory roles" and choose admin roles
  6. Under "Assignments > Cloud apps", select "All cloud apps"
  7. Under "Access controls > Grant", select "Require authentication strength" and choose "Phishing-resistant MFA"
  8. Set "Enable policy" to "Report-only" initially
  9. Click "Create"
  10. Review the report-only results before changing to "On"

Impact

Once the policy is enabled, admins without phishing-resistant MFA methods registered will be unable to sign in.

More Information

For more details, visit Microsoft's guide on phishing-resistant MFA.