

You can amend these, however Microsoft recommends protecting these roles and then adding to the list of protected roles. When enabling the Require multifactor authentication for admins policy, 14 roles are protected by default. Take a look at a two part series on PIM here. We also recommend that you implement Privileged Identity Management (PIM) in your environment. By enforcing MFA on these roles, you can reduce the risk of the accounts being compromised. Accounts with assigned admin rights are targets for attackers. The Require multifactor authentication for admins policy assists with protecting administrator roles in Azure AD. Some MFA settings can also be managed by the Authentication Policy Administrator.įor an overview of Azure AD Multifactor Authentication, we recommend that you take a look at Part 2 – Require multifactor authentication for all users.

Management of the policies via an administrator with either Global Administrator, Conditional Access or Security Administrator rights.Note the following pre-requisites to be able to tap into Multifactor Authentication (MFA). Multifactor Authentication Pre-Requisites Part 6 – Require Password Change for High Risk Users.Part 5 – Require multifactor authentication for Azure Management.

