Multi-Factor Authentication (MFA) Enabled vs. Enforced
Enabled Azure Multi-Factor Authentication by Changing User States
Enforced Azure Multi-Factor Authentication
Enabling Azure Multi-Factor Authentication with a Conditional Access Policy
This is a more flexible approach for requiring two-step verification. It only works for Azure MFA in the cloud, though, and conditional access is a paid feature of Azure Active Directory. You can create conditional access policies that apply to groups as well as individual users. High-risk groups can be given more restrictions than low-risk groups, or two-step verification can be required only for high-risk cloud apps and skipped for low-risk ones.
Both options prompt users to register for Azure Multi-Factor Authentication the first time they sign in after the requirements turn on. For more documentation for Microsoft on Azure AD Multi-Factor Authentication, click here.
How to Get a Report of Users and Their MFA Status
- From the Cayosoft Administrator console, click new Rule
- Click Show All Templates
- Click Office 365 Multi-factor Authentication (MFA) Status, then click click Next
- Click Create and Save Report, then click Next
- Click Finish, then click Run Rule
- When prompted save the rule, then confirm the report was started
- When the green balloon at the to right turns from Green to Blue the report is ready
- In the Navigation Tree click the Reports node
- Double click the new report to open it