1.2.5 Ensure Multi-factor Authentication is Required for Risky Sign-ins

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

For designated users, they will be prompted to use their multi-factor authentication (MFA) process on login.

Rationale:

Enabling multi-factor authentication is a recommended setting to limit the potential of accounts being compromised and limiting access to authenticated personnel.

Impact:

There is an increased cost, as Conditional Access policies require Azure AD Premium. Similarly, they may require additional overhead to maintain if users lose access to their MFA.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

From Azure Portal

From Azure Home select the Portal Menu in the top left, and select Azure Active Directory.

Scroll down in the menu on the left, and select Security

Select on the left side Conditional Access.

Click the + New policy

Default Value:

MFA is not enabled by default.

See Also

https://workbench.cisecurity.org/files/4052