Skip to content

Commit a3613f8

Browse files
authored
Merge pull request #248158 from AlizaBernstein/WI-132721-arg-query-for-mfa-object-id
WI-132721-arg-query-for-mfa-object-id
2 parents 43958da + 3e2e52d commit a3613f8

File tree

1 file changed

+17
-15
lines changed

1 file changed

+17
-15
lines changed

articles/defender-for-cloud/multi-factor-authentication-enforcement.md

Lines changed: 17 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,14 @@
22
title: Security recommendations for multi-factor authentication
33
description: Learn how to enforce multi-factor authentication for your Azure subscriptions using Microsoft Defender for Cloud
44
ms.topic: conceptual
5-
ms.date: 06/28/2023
5+
ms.date: 08/14/2023
66
---
77

8-
# Manage multi-factor authentication (MFA) enforcement on your subscriptions
8+
# Manage multi-factor authentication (MFA) on your subscriptions
99

10-
If you're using passwords, only to authenticate your users, you're leaving an attack vector open. Users often use weak passwords or reuse them for multiple services. With [MFA](https://www.microsoft.com/security/business/identity/mfa) enabled, your accounts are more secure, and users can still authenticate to almost any application with single sign-on (SSO).
10+
If you're using passwords only to authenticate your users, you're leaving an attack vector open. Users often use weak passwords or reuse them for multiple services. With [MFA](https://www.microsoft.com/security/business/identity/mfa) enabled, your accounts are more secure, and users can still authenticate to almost any application with single sign-on (SSO).
1111

12-
There are multiple ways to enable MFA for your Azure Active Directory (AD) users based on the licenses that your organization owns. This page provides the details for each in the context of Microsoft Defender for Cloud.
12+
There are multiple ways to enable MFA for your Azure Active Directory (Azure AD) users based on the licenses that your organization owns. This page provides the details for each in the context of Microsoft Defender for Cloud.
1313

1414
## MFA and Microsoft Defender for Cloud
1515

@@ -21,7 +21,7 @@ The recommendations in the Enable MFA control ensure you're meeting the recommen
2121
- Accounts with write permissions on Azure resources should be MFA enabled
2222
- Accounts with read permissions on Azure resources should be MFA enabled
2323

24-
There are three ways to enable MFA and be compliant with the two recommendations in Defender for Cloud: security defaults, per-user assignment, conditional access (CA) policy.
24+
There are three ways to enable MFA and be compliant with the two recommendations in Defender for Cloud: security defaults, per-user assignment, and conditional access (CA) policy.
2525

2626
### Free option - security defaults
2727

@@ -33,7 +33,7 @@ Customers with Microsoft 365 can use **Per-user assignment**. In this scenario,
3333

3434
### MFA for Azure AD Premium customers
3535

36-
For an improved user experience, upgrade to Azure AD Premium P1 or P2 for **conditional access (CA) policy** options. To configure a CA policy, you'll need [Azure Active Directory (AD) tenant permissions](../active-directory/roles/permissions-reference.md).
36+
For an improved user experience, upgrade to Azure AD Premium P1 or P2 for **conditional access (CA) policy** options. To configure a CA policy, you need [Azure Active Directory (Azure AD) tenant permissions](../active-directory/roles/permissions-reference.md).
3737

3838
Your CA policy must:
3939

@@ -51,7 +51,7 @@ Learn more in the [Azure Conditional Access documentation](../active-directory/c
5151

5252
## Identify accounts without multi-factor authentication (MFA) enabled
5353

54-
You can view the list of user accounts without MFA enabled from either the Defender for Cloud recommendations details page, or using Azure Resource Graph.
54+
You can view the list of user accounts without MFA enabled from either the Defender for Cloud recommendations details page, or by using the Azure Resource Graph.
5555

5656
### View the accounts without MFA enabled in the Azure portal
5757

@@ -63,24 +63,26 @@ To see which accounts don't have MFA enabled, use the following Azure Resource G
6363

6464
1. Open **Azure Resource Graph Explorer**.
6565

66-
:::image type="content" source="./media/multi-factor-authentication-enforcement/opening-resource-graph-explorer.png" alt-text="Launching Azure Resource Graph Explorer** recommendation page" :::
66+
:::image type="content" source="./media/multi-factor-authentication-enforcement/opening-resource-graph-explorer.png" alt-text="Screenshot showing launching the Azure Resource Graph Explorer** recommendation page" lightbox="media/multi-factor-authentication-enforcement/opening-resource-graph-explorer.png":::
6767

6868
1. Enter the following query and select **Run query**.
6969

70-
```kusto
70+
```
7171
securityresources
72-
| where type == "microsoft.security/assessments"
73-
| where properties.displayName contains "Accounts with owner permissions on Azure resources should be MFA enabled"
74-
| where properties.status.code == "Unhealthy"
72+
| where type =~ "microsoft.security/assessments/subassessments"
73+
| where id has "assessments/dabc9bc4-b8a8-45bd-9a5a-43000df8aa1c" or id has "assessments/c0cb17b2-0607-48a7-b0e0-903ed22de39b" or id has "assessments/6240402e-f77c-46fa-9060-a7ce53997754"
74+
| parse id with start "/assessments/" assessmentId "/subassessments/" userObjectId
75+
| summarize make_list(userObjectId) by strcat(tostring(properties.displayName), " (", assessmentId, ")")
76+
| project ["Recommendation Name"] = Column1 , ["Account ObjectIDs"] = list_userObjectId
7577
```
7678
7779
1. The `additionalData` property reveals the list of account object IDs for accounts that don't have MFA enforced.
7880
7981
> [!NOTE]
80-
> The accounts are shown as object IDs rather than account names to protect the privacy of the account holders.
82+
> The 'Account ObjectIDs' column contains the list of account object IDs for accounts that don't have MFA enforced per recommendation.
8183
82-
> [!TIP]
83-
> Alternatively, you can use the Defender for Cloud REST API method [Assessments - Get](/rest/api/defenderforcloud/assessments/get).
84+
> [!TIP]
85+
> Alternatively, you can use the Defender for Cloud REST API method [Assessments - Get](/rest/api/defenderforcloud/assessments/get).
8486
8587
## Next steps
8688

0 commit comments

Comments
 (0)