Description: 

This control ensures that all non-privileged user accounts have Multi-Factor Authentication enabled to provide an additional layer of identity protection. Enabling MFA helps prevent unauthorized access by requiring a second verification method during login, significantly improving security against phishing, credential theft, and account misuse.


Rationale:

Non-privileged accounts are common targets for cyberattacks. Enabling MFA reduces the risk of unauthorized access by ensuring that compromised passwords alone cannot be used, helping protect corporate data and preventing attackers from gaining access to internal systems.


Impact:

Users will experience an extra authentication step during login, which may slightly increase sign-in time. However, this improves overall system security, reduces account compromise risk, and strengthens trust in access control mechanisms across the organization.


Pre-requisites:

  • Global Administrator or Security Administrator access to Microsoft Entra ID

  • Non-privileged users exist in Microsoft Entra ID.


Test Plan:

  1. Sign in to the Azure Portal at https://portal.azure.com

  2. Search for Microsoft Entra ID and open it

  3. Select Users under Manage

  4. Open Per-user MFA

  5. Review all non-privileged users

  1. Verify Multi-Factor Auth Status is set to Enabled or Enforced for each non-privileged user

  2. If Multi-Factor Auth Status is not Enabled or Enforced, follow the implementation steps

Implementation Steps:

  1. Sign in to the Azure Portal at https://portal.azure.com

  2. Search for Microsoft Entra ID and open it

  3. Select Users under Manage

                                  


  1. Open Per-user MFA

                                

  1. Select the non-privileged user with Multi-Factor Auth Status set to Disabled

  1. Click Enable

                       

  1. Confirm the action and save

Backup:

  1. Sign in to the Azure Portal at https://portal.azure.com.

  2. Search for Microsoft Entra ID and open it

  3. Select Users under Manage

  4. Open Per-user MFA

  5. Select the changed non-privileged user

  6. Change Multi-Factor Auth Status from Enabled or Enforced to Disabled

References: 

  1. https://learn.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-userstates

  2. https://learn.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-userstates#enable-and-enforce-mfa

  3. https://learn.microsoft.com/en-us/azure/active-directory/roles/permissions-reference