You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
[Azure AD recommendations](overview-recommendations.md) is a feature that provides you with personalized insights and actionable guidance to align your tenant with recommended best practices.
21
21
22
-
23
22
This article covers the recommendation to minimize multi-factor authentication (MFA) prompts from known devices. This recommendation is called `tenantMFA` in the recommendations API in Microsoft Graph.
24
23
25
24
## Description
26
25
27
26
As an admin, you want to maintain security for your company’s resources, but you also want your employees to easily access resources as needed.
28
27
29
-
MFA enables you to enhance the security posture of your tenant. While enabling MFA is a good practice, you should try to keep the number of MFA prompts your users have to go through at a minimum. One option you have to accomplish this goal is to **allow users to remember multi-factor authentication on devices they trust**.
30
-
31
-
The remember multi-factor authentication feature sets a persistent cookie on the browser when a user selects the Don't ask again for X days option at sign-in. The user isn't prompted again for MFA from that browser until the cookie expires. If the user opens a different browser on the same device or clears the cookies, they're prompted again to verify.
28
+
MFA enables you to enhance the security posture of your tenant. While enabling MFA is a good practice, you should try to keep the number of MFA prompts your users have to go through at a minimum. One option you have to accomplish this goal is to **allow users to remember multi-factor authentication on trusted devices**.
32
29
33
-

30
+
The "remember multi-factor authentication on trusted device" feature sets a persistent cookie on the browser when a user selects the "Don't ask again for X days" option at sign-in. The user isn't prompted again for MFA from that browser until the cookie expires. If the user opens a different browser on the same device or clears the cookies, they're prompted again to verify.
34
31
35
32
For more information, see [Configure Azure AD Multi-Factor Authentication settings](../authentication/howto-mfa-mfasettings.md).
36
33
37
-
38
-
## Logic
39
-
40
-
This recommendation shows up, if you have set the remember multi-factor authentication feature to less than 30 days.
41
-
34
+
This recommendation shows up if you have set the **remember multi-factor authentication** feature to less than 30 days.
42
35
43
36
## Value
44
37
45
38
This recommendation improves your user's productivity and minimizes the sign-in time with fewer MFA prompts. Ensure that your most sensitive resources can have the tightest controls, while your least sensitive resources can be more freely accessible.
46
39
47
40
## Action plan
48
41
49
-
1. Review [configure Azure AD Multi-Factor Authentication settings](../authentication/howto-mfa-mfasettings.md).
42
+
1. Review the [How to configure Azure AD Multi-Factor Authentication settings](../authentication/howto-mfa-mfasettings.md) article.
43
+
1. Go to **Azure AD** > **Multifactor authentication** > select the **Additional cloud-based multifactor authentication settings** link.
44
+
45
+

46
+
47
+
1. Adjust the number of days in the **remember multi-factor authentication on trusted device** section to 90 days.
48
+
49
+

50
50
51
-
2. Set the remember multi-factor authentication feature to 90 days.
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/recommendation-migrate-apps-from-adfs-to-azure-ad.md
+2-6Lines changed: 2 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.topic: reference
9
9
ms.workload: identity
10
10
ms.subservice: report-monitor
11
-
ms.date: 03/02/2023
11
+
ms.date: 03/07/2023
12
12
ms.author: sarahlipsey
13
13
ms.reviewer: hafowler
14
14
@@ -23,11 +23,7 @@ This article covers the recommendation to migrate apps from Active Directory Fed
23
23
24
24
## Description
25
25
26
-
As an admin responsible for managing applications, I want my applications to use Azure AD’s security features and maximize their value.
27
-
28
-
## Logic
29
-
30
-
If a tenant has apps on AD FS, and any of these apps are deemed 100% migratable, this recommendation shows up.
26
+
As an admin responsible for managing applications, you want your applications to use Azure AD’s security features and maximize their value. This recommendation shows up if your tenant has apps on ADFS that can 100% be migrated to Azure AD.
This article covers the recommendation to migrate users to the Microsoft Authenticator app, which is currently a preview recommendation. This recommendation is called `useAuthenticatorApp` in the recommendations API in Microsoft Graph.
23
23
24
-
25
24
## Description
26
25
27
-
Multi-factor authentication (MFA) is a key component to improve the security posture of your Azure AD tenant. However, while keeping your tenant safe is important, you should also keep an eye on keeping the security related overhead as little as possible on your users.
26
+
Multi-factor authentication (MFA) is a key component to improve the security posture of your Azure AD tenant. While SMS text and voice calls were once commonly used for multi-factor authentication, they are becoming increasingly less secure. You also don't want to overwhelm your users with lots of MFA methods and messages.
28
27
29
-
One possibility to accomplish this goal is to migrate users using SMS or voice call for MFA to use the Microsoft authenticator app.
28
+
One way to ease the burden on your users while also increasing the security of their authentication methods is to migrate anyone using SMS or voice call for MFA to use the Microsoft Authenticator app.
30
29
31
30
This recommendation appears if Azure AD detects that your tenant has users authenticating using SMS or voice instead of the Microsoft Authenticator app in the past week.
32
31
33
-

34
-
35
32
## Value
36
33
37
34
Push notifications through the Microsoft Authenticator app provide the least intrusive MFA experience for users. This method is the most reliable and secure option because it relies on a data connection rather than telephony.
0 commit comments