Previous All Posts Next

How To Make Microsoft 365's Multi-Factor Authentication (MFA) as secure as possible

Posted: November 1, 2024 to Tips & Tricks.

Tags: Compliance, Malware, Data Breach

1. Use Strong MFA Methods

  • Avoid SMS: SMS-based authentication is vulnerable to SIM-swapping attacks. Instead, use more secure methods like authenticator apps (Microsoft Authenticator, Google Authenticator) or physical hardware security keys.
  • Implement Biometric Authentication: Where possible, incorporate biometric options like fingerprint or facial recognition, available on Microsoft Authenticator or through FIDO2-compatible devices.

2. Enable Conditional Access Policies

  • Context-Based MFA: Use Conditional Access to require MFA only under specific conditions, such as when logging in from an untrusted location, using a non-compliant device, or during high-risk sessions.
  • Block Access Based on Location: Restrict logins from high-risk countries or locations where your organization doesn’t operate. This makes it harder for attackers to bypass MFA if they’re attempting access from a suspicious area.

3. Implement Number Matching in Microsoft Authenticator

  • Mitigate MFA Fatigue: Microsoft Authenticator’s number matching feature requires users to enter a number displayed on the login screen, rather than just approving a notification. This added step reduces the likelihood of users approving unintended MFA requests in MFA fatigue attacks.

4. Enable Anti-Phishing Techniques like FIDO2/WebAuthn Authentication

  • Resist MitM Attacks: WebAuthn and FIDO2 authentication standards protect against phishing and Man-in-the-Middle (MitM) attacks by binding authentication to a specific device and origin.
  • Passwordless Authentication: FIDO2 security keys or other passwordless options (like Windows Hello for Business) provide a highly secure and user-friendly MFA experience, reducing reliance on passwords altogether.

5. Use Session Management Policies

  • Session Expiry: Set shorter token lifetimes for sensitive applications, requiring users to reauthenticate periodically.
  • Device and IP Restrictions: Limit the reuse of MFA tokens to specific IP addresses or devices, making it harder for attackers to use a stolen session token.

6. Monitor and Respond to Unusual MFA Activity

  • Configure Alerts for MFA Requests: Enable alerts for unusual authentication patterns or excessive MFA requests, which could indicate MFA fatigue or a potential brute-force attempt.
  • Review Sign-In Logs Regularly: Use the Azure AD sign-in logs to monitor for unusual login attempts, location changes, or access from unauthorized devices.

7. Educate Users About MFA Security Practices

  • Awareness Training: Train users to recognize MFA prompts they did not initiate and understand the importance of rejecting unfamiliar requests. Emphasize vigilance and discourage automatic approval of push notifications.

8. Enforce Device Compliance

  • Device-Based Access Policies: Require users to authenticate only from compliant, managed devices. Enforcing device compliance (including updates and antivirus checks) adds another layer of security, especially for sensitive applications.

By combining these practices, you can significantly enhance the security of Microsoft 365’s MFA, reduce the risk of compromise, and better protect sensitive data and applications.

Protect Your Business Today

Petronella Technology Group has provided cybersecurity, compliance, and managed IT services from Raleigh, NC for over 23 years. Contact us today for a free consultation and technology assessment.

Need help implementing these strategies? Our cybersecurity experts can assess your environment and build a tailored plan.
Get Free Assessment

About the Author

Craig Petronella, CEO and Founder of Petronella Technology Group
CEO, Founder & AI Architect, Petronella Technology Group

Craig Petronella founded Petronella Technology Group in 2002 and has spent more than 30 years working at the intersection of cybersecurity, AI, compliance, and digital forensics. He holds the CMMC Registered Practitioner credential (RP-1372) issued by the Cyber AB, is an NC Licensed Digital Forensics Examiner (License #604180-DFE), and completed MIT Professional Education programs in AI, Blockchain, and Cybersecurity. Craig also holds CompTIA Security+, CCNA, and Hyperledger certifications.

He is an Amazon #1 Best-Selling Author of 15+ books on cybersecurity and compliance, host of the Encrypted Ambition podcast (95+ episodes on Apple Podcasts, Spotify, and Amazon), and a cybersecurity keynote speaker with 200+ engagements at conferences, law firms, and corporate boardrooms. Craig serves as Contributing Editor for Cybersecurity at NC Triangle Attorney at Law Magazine and is a guest lecturer at NCCU School of Law. He has served as a digital forensics expert witness in federal and state court cases involving cybercrime, cryptocurrency fraud, SIM-swap attacks, and data breaches.

Under his leadership, Petronella Technology Group has served 2,500+ clients, maintained a zero-breach record among compliant clients, earned a BBB A+ rating every year since 2003, and been featured as a cybersecurity authority on CBS, ABC, NBC, FOX, and WRAL. The company leverages SOC 2 Type II certified platforms and specializes in AI implementation, managed cybersecurity, CMMC/HIPAA/SOC 2 compliance, and digital forensics for businesses across the United States.

CMMC-RP NC Licensed DFE MIT Certified CompTIA Security+ Expert Witness 15+ Books
Related Service
Keep Your Business Secure

Our cybersecurity experts can help you implement these best practices across your organization.

Get a Free Security Assessment
Previous All Posts Next
Free cybersecurity consultation available Schedule Now