AI is transforming cybersecurity, but attackers still rely heavily on identity weaknesses.
That is why Multi-Factor Authentication remains one of the most important security basics in Microsoft 365.
MFA is not new. It is not flashy. But it still matters because identity is the front door to company data.
Start with full coverage
The first MFA question is simple: Is MFA enforced for every user who can access company data?
Not just admins. Not just remote users. Not just "high-risk" users.
Every user.
Microsoft now has mandatory MFA requirements for Azure and admin portals, reflecting how important MFA has become for protecting administrative access.
But organisations should go further than admin-only protection. A compromised standard user account can still expose mailboxes, files, Teams chats, SharePoint sites, and internal business processes.
Protect administrators first — and stronger
Admin accounts need stronger protection than normal accounts.
Microsoft recommends phishing-resistant MFA for highly privileged roles and provides Conditional Access guidance for requiring phishing-resistant authentication for administrators.
This means organisations should move beyond basic MFA methods where possible and prioritise stronger options such as:
- FIDO2 security keys.
- Windows Hello for Business.
- Certificate-based authentication.
- Other phishing-resistant methods supported by Microsoft Entra authentication strengths.
Microsoft Entra authentication strengths include categories such as MFA strength, passwordless MFA strength, and phishing-resistant MFA strength.
Avoid weak MFA patterns
Not all MFA is equal.
A good MFA baseline should avoid or reduce reliance on weaker methods such as SMS where stronger alternatives are available. It should also account for MFA fatigue attacks, where users are repeatedly prompted until they approve a sign-in.
Better practices include:
- Use number matching in Microsoft Authenticator.
- Prefer passwordless and phishing-resistant methods.
- Require stronger MFA for administrators and sensitive apps.
- Use Conditional Access to adapt requirements based on risk, location, device compliance, and application.
- Monitor registration gaps and users without strong authentication methods.
- Maintain break-glass accounts with strict controls and monitoring.
Microsoft's phishing-resistant passwordless guidance explains that these methods use hardware-backed credentials and are designed to deflect phishing attacks more effectively than traditional MFA.
MFA should be part of a bigger identity baseline
MFA is powerful, but it should not stand alone.
It works best together with:
- Conditional Access.
- Identity Protection.
- Privileged Identity Management.
- Device compliance.
- Sign-in risk monitoring.
- Strong admin role separation.
- Legacy authentication blocking.
Microsoft also provides Conditional Access templates that combine MFA, compliant devices, and hybrid joined devices as access requirements.
The Epiteera perspective
Epiteera helps customers answer the practical MFA questions:
Is MFA enforced? Are admins protected with stronger methods? Are weak authentication methods still allowed? Are there users without registered methods? Are Conditional Access policies consistent? Are unmanaged devices still able to access data?
MFA is one of the simplest examples of the Epiteera philosophy.
Before chasing complexity, make sure the foundation is strong.
Because in security, the basics are not basic because they are easy.
They are basic because everything else depends on them.
Want to know whether MFA is fully enforced in your Microsoft 365 tenant — and whether admins are protected with phishing-resistant methods?
Start your free Health Check