In the last couple of weeks, I have been working on deploying Office 365 Multi-Factor Authentication. The main challenge was not the setup of MFA in Office 365, but with deploying this in our organization was to inform our users, so we don’t get too many helpdesk tickets once MFA is enabled, and to come up with a good rollout plan.
In this article, I will walk you through the setup process of Office 365 multi factor authentication and give you some tips on how to roll it out in your organisation.
Office 365 MFA License
Before we start with the setup of MFA in Office 365, we will take a quick look at the license. Multi-factor authentication is part of the Microsoft 365 business (and Office 365) plans. With Office 365 MFA you can only protect Office 365 applications.
This means that all Office 365 Online applications are protected and also the OneDrive client and Outlook application. What isn’t protected with MFA is, for example, logging-in on your computer.
Multi-Factor Authentication for Office 365 doesn’t offer all security features that are available in the Azure MFA version. But more than enough for a good additional security layer on your user sign-ins.
The following features are available:
- Mobile app (Microsoft Authenticator app)
- Phone call
- App password for clients that don’t support MFA (Gmail app on Android for example)
- Remember MFA for trusted devices
One of the features that I really miss compared to the Azure MFA version is the One-Time bypass and the Trusted IP’s.
Setup mfa office 365
You need to be tenant Admin to setup MFA for you Office 365 tenant. I have enable the new admin center layout (top right corner), suggest you do the same if you haven’t done it already.
- Open the Admin Center and go to Users > Active Users
- Open Multi-factor authentication
Don’t select any user yet, just open the Multi-factor authentication screen. You will find the button in the toolbar.
- Open the Service settings
Before we start enabling MFA for the users, we first go through the service settings. The button to the settings screen doesn’t stand out, but it’s just below the title
- Setup MFA Office 365
A few settings are important here:
Make sure you check the App password. Otherwise, users can’t authenticate in some applications ( like the default mail app in Android).
Also, take a look at the remember function. By default, it is set to 14 days.
- Enable MFA for Office 365 users
After you have set the settings to your liking click on save and then on users (just below the title Multi-factor authentication).
You see the list of your users again. Here you can select single or multiple users to enable MFA.
At the moment you enable Office 365 MFA for a user it can get the setup screen as soon as the users browse to one of the Office 365 products.
Using the bulk update feature
You can also enable multi-factor authentication with the bulk update feature. This works with a simple excel file containing the usernames and the required status (enable, disable). Just click on the bulk update button and download the sample file
Using PowerShell to enable MFA
Another option is to use PowerShell to enable MFA. The advantage of using PowerShell is that you can automate it, so you never forget the enable it for a user. I have created a small script to enable MFA with PowerShell that you can find here. I also created a script to get the MFA status of your users that you can find in this article.
Planning the roll-out
When you enable MFA for a user it will, at the next login, get a screen that additional security measure is required. So make sure you have informed your user up front with a clear user guide on the steps they have to take.
Some of the fall pits I come across are:
- Some users didn’t notice they had to select the mobile app in step 1. So they got an SMS text which isn’t really user-friendly
- Make sure your users select “Receive notification for verification“
- Users with an Apple need to allow push notification for the Microsoft Authenticator app. Not all Apple users know where to find that (resulting in helpdesk calls)
- If users start the MFA process them self, through https://aka.ms/mfasetup, they can’t create an app password immediately
Create I pilot group with different type of users. I start with 15 users spread across the company to test MFA for 6 weeks. This allowed me to improve the manual and detect any issue that might come up.
If you have a large organisation make sure you roll it out in batches. No matter how good the manual is, it will result in a raise of helpdesk tickets.
Changing user preferences
Users can easily change their preferences or manage the connected mobile phone(s) through there Office 365 account page. Also, the creating of an additional app password can be done here by the user self.
- Login at myaccount.microsoft.com
- Go to Security Info in the menu on the left side
At the top you can change the Default sign-in method. The most user friendly option here is to use the Microsoft Authenticator – Notification.
In the list you can add different authentication methods, which is always a good idea to have in case the app isn’t working or if you have switches phone and the app not installed yet.
The user can create an app password. One password can be used for multiple applications, but it is better to create unique app passwords every application that can’t handle MFA.
There is no reason not to use multi-factor authentication in Office 365. The setup is done in a couple of minutes and the user impact is minimal. It ads an additional layer of security to a part of your IT environment which is always a good thing.
The video below from Microsoft is really great to inform your users, so even the most in experienced user is able to enable MFA.
You may also like this article about using OneDrive to safely store the users desktop, documents and image folder.