Skip to content

Commit d1b90bc

Browse files
authored
Merge pull request #108156 from iainfoulds/patch-1
[AzureAD] Update fundamentals MFA overview
2 parents d39212e + c1ee2e6 commit d1b90bc

File tree

1 file changed

+15
-16
lines changed

1 file changed

+15
-16
lines changed
Lines changed: 15 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: Enable Multi-Factor Authentication for your organization - Azure Active Directory
3-
description: Enable Azure MFA for your organization based on your license
2+
title: Azure Multi-Factor Authentication for your organization - Azure Active Directory
3+
description: Learn about the available features of Azure Multi-Factor Authentication for your organization based on your license model
44

55
services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 12/06/2019
9+
ms.date: 03/18/2020
1010

1111
ms.author: iainfou
1212
author: iainfoulds
@@ -15,38 +15,38 @@ ms.reviewer: michmcla
1515

1616
ms.collection: M365-identity-device-management
1717
---
18-
# Enable Multi-Factor Authentication for your organization
18+
# Overview of Azure Multi-Factor Authentication for your organization
1919

20-
There are multiple ways to enable Azure Multi-Factor Authentication (MFA) for your Azure Active Directory (AD) users based on the licenses that your organization owns.
20+
There are multiple ways to enable Azure Multi-Factor Authentication for your Azure Active Directory (AD) users based on the licenses that your organization owns.
2121

2222
![Investigate signals and enforce MFA if needed](./media/concept-fundamentals-mfa-get-started/verify-signals-and-perform-mfa-if-required.png)
2323

24-
Based on our studies, your account is more than 99.9% less likely to be compromised if you use MFA.
24+
Based on our studies, your account is more than 99.9% less likely to be compromised if you use multi-factor authentication (MFA).
2525

26-
So how does your organization turn on multi-factor authentication even for free, before becoming a statistic?
26+
So how does your organization turn on MFA even for free, before becoming a statistic?
2727

2828
## Free option
2929

3030
Customers who are utilizing the free benefits of Azure AD can use [security defaults](../fundamentals/concept-fundamentals-security-defaults.md) to enable multi-factor authentication in their environment.
3131

32-
## Office 365
32+
## Office 365 Business Premium, E3, or E5
3333

3434
For customers with Office 365, there are two options:
3535

36-
- [Security defaults](concept-fundamentals-security-defaults.md) can be enabled through Azure AD to protect all of your users with Azure Multi-Factor Authentication.
37-
- If your organization requires more granularity in providing multi-factor authentication, your Office licenses include [per-user MFA](../authentication/howto-mfa-userstates.md) capabilities. Per-user MFA is enabled and enforced on each user individually by administrators.
36+
* Azure Multi-Factor Authentication is either enabled or disabled for all users, for all sign-in events. There is no ability to only enable multi-factor authentication for a subset of users, or only under certain scenarios. Management is through the Office 365 portal.
37+
* For an improved user experience, upgrade to Azure AD Premium P1 or P2 and use Conditional Access. For more information, see secure Office 365 resources with multi-factor authentication.
3838

3939
## Azure AD Premium P1
4040

4141
For customers with Azure AD Premium P1 or similar licenses that include this functionality such as Enterprise Mobility + Security E3, Microsoft 365 F1, or Microsoft 365 E3:
4242

43-
The recommendation is to use [Conditional Access policies](../conditional-access/concept-conditional-access-policy-common.md) for the best user experience.
43+
Use [Azure AD Conditional Access](../conditional-access/overview.md) to prompt users for multi-factor authentication during certain scenarios or events to fit your business requirements.
4444

4545
## Azure AD Premium P2
4646

4747
For customers with Azure AD Premium P2 or similar licenses that include this functionality such as Enterprise Mobility + Security E5 or Microsoft 365 E5:
4848

49-
The recommendation is to use [Conditional Access policies](../conditional-access/concept-conditional-access-policy-common.md) along with [Identity Protection](../identity-protection/overview-v2.md) risk policies for the best user experience and enforcement flexibility.
49+
Provides the strongest security position and improved user experience. Adds [risk-based Conditional Access](../conditional-access/howto-conditional-access-policy-risk.md) to the Azure AD Premium P1 features that adapts to user's patterns and minimizes multi-factor authentication prompts.
5050

5151
## Authentication methods
5252

@@ -56,10 +56,9 @@ The recommendation is to use [Conditional Access policies](../conditional-access
5656
| Verification code from mobile app or hardware token | | X |
5757
| Text message to phone | | X |
5858
| Call to phone | | X |
59-
| App passwords | | X** |
60-
61-
** App passwords are only available in per-user MFA with legacy authentication scenarios only if enabled by administrators.
6259

6360
## Next steps
6461

65-
[Azure AD pricing page](https://azure.microsoft.com/pricing/details/active-directory/)
62+
To get started, see the tutorial to [secure user sign-in events with Azure Multi-Factor Authentication](../authentication/tutorial-enable-azure-mfa.md).
63+
64+
For more information on licensing, see [Features and licenses for Azure Multi-Factor Authentication](../authentication/concept-mfa-licensing.md).

0 commit comments

Comments
 (0)