https://store-images.s-microsoft.com/image/apps.63518.438d2bab-a404-420b-9c95-fcf663fdd7aa.b57cf8f5-bb51-4496-8892-7c24e247cf48.3f3fcf3c-cbd7-460d-b1b2-9ee03d2e1530

Microsoft 365 MFA-Conditional Access: 4-days implementation

PROJECT INFORMATICA SRL

The goal is to increase security by implementing Azure MFA and Conditional Access solutions available on the Microsoft 365 platform

The goal is to increase security by implementing Azure MFA and Conditional Access solutions available on the Microsoft 365 platform. In addition, a communication campaign will be built to promote and sensitize users on the issue as well as the activation of two-factor verification.

 

Multi-factor authentication is a process where, when signing in, the user is asked to provide an additional form of authentication, such as entering a code on their mobile phone or scanning their fingerprint.

 

With Azure AD Multi-Factor Authentication, you can use the following additional forms of verification:

  • App Microsoft Authenticator
  • Token hardware OATH
  • sms
  • Voice call

 

For more granular controls, you can use Conditional Access features to define events or applications that require multi-factor authentication. These policies can allow regular sign-in events when the user is on the corporate network or a registered device but requires other verification factors when the user is remote or on a personal device.

Conditional Access capabilities allow you to control access on cloud or on-premise applications, based on certain conditions defined by the IT department.

You can control access to cloud apps based on the user's network location. The location condition is commonly used to block access from countries or regions where traffic to your organization shouldn't be coming from.

Organizations that have Microsoft Intune can use the information returned by devices to identify devices that meet compliance requirements, such as:

  1. Request to unlock a PIN;
  2. Request device encryption;
  3. Requiring a minimum or maximum version of the operating system;
  4. The request for a device is not jailbroken or rooted.

Conditional Access is one of the essential features of the Zero Trust model.

Instead of thinking that everything behind the corporate firewall is secure, the Zero Trust model assumes a breach and verifies every request as if it came from an open network. Regardless of where the request comes from or what resource it accesses, Zero Trust teaches us to never trust and always verify. Before granting access, each request is fully authenticated, authorized, and encrypted. The principles of micro-segmentation and less privileged access are applied to minimize lateral movements. Advanced intelligence and analytics are used to detect and respond to anomalies in real time.

At a glance

https://store-images.s-microsoft.com/image/apps.15505.438d2bab-a404-420b-9c95-fcf663fdd7aa.47bb849b-addc-43e3-98fb-ed9b142ccfdd.bcd948d4-47e4-46d6-82c2-9d06b6f5a3a5
https://store-images.s-microsoft.com/image/apps.24887.438d2bab-a404-420b-9c95-fcf663fdd7aa.47bb849b-addc-43e3-98fb-ed9b142ccfdd.6cba2c7e-169e-4d13-94e1-ce1150a16bd5
https://store-images.s-microsoft.com/image/apps.43285.438d2bab-a404-420b-9c95-fcf663fdd7aa.47bb849b-addc-43e3-98fb-ed9b142ccfdd.14dfc062-026b-42e4-b181-d47f98e7640f
https://store-images.s-microsoft.com/image/apps.43273.438d2bab-a404-420b-9c95-fcf663fdd7aa.47bb849b-addc-43e3-98fb-ed9b142ccfdd.d117905a-8ed1-467d-a734-3439e8f4bbe6
https://store-images.s-microsoft.com/image/apps.60628.438d2bab-a404-420b-9c95-fcf663fdd7aa.47bb849b-addc-43e3-98fb-ed9b142ccfdd.50725b4f-4c11-477a-b1a8-616358622909