🛡️ Essential 8 Guide

Implementation guidance for Australian Essential Eight controls in Microsoft environments - ISM controls with PSPF mappings

About
HOME ← ISM-0843
ISM-1173 →

Multi-factor authentication is used to authenticate unprivileged users of systems

Property Value
ISM Control ISM-0974
Revision 6
Updated Sep-21
Guideline Not provided
Section Authentication hardening
Topic Multi-factor authentication
Essential Eight ML2, ML3
PSPF Levels NC, OS, P, S, TS

Summary

Multi-factor authentication is used to authenticate unprivileged users, mitigating credential theft by enforcing a Conditional Access policy in Microsoft Entra ID that requires MFA at sign-in1. The policy can combine MFA with additional controls, such as device compliance and hybrid join, to strengthen access security2.

The Conditional Access grant control used should align with the required maturity level. At Maturity Level 2, the standard Require multi-factor authentication grant (or the built-in Multifactor authentication strength) is sufficient. At Maturity Level 3, the grant must be changed to Require authentication strength → Phishing-resistant MFA, which restricts acceptable methods to FIDO2 security keys, Windows Hello for Business (hardware TPM), certificate-based authentication, or device-bound passkeys — and excludes SMS OTP, push notifications, and OATH tokens.34

Justification

Not provided in source documentation.

Design Decision

[!NOTE] The Conditional Access policy requiring multifactor authentication will be created in the Entra ID Portal to enforce MFA for user sign-ins. It will apply the grant control Require multifactor authentication to all users accessing all resources.

Prerequisites

Implementation Steps

Create conditional access policy requiring multifactor authentication in Entra ID Portal

  1. Sign in to the Microsoft Entra admin center as at least a Conditional Access Administrator.1
  2. Browse to Entra ID > Conditional Access > Policies.1
  3. Select New policy.1
  4. Name the policy. We recommend that organizations create a meaningful standard for the names of their policies.1
  5. Under Assignments, select Users or workload identities.
    • Under Include, select All users.
    • Under Exclude: select emergency access or break-glass accounts. If you use hybrid identity solutions like Microsoft Entra Connect or Microsoft Entra Connect Cloud Sync, select Directory roles, then select Directory Synchronization Accounts.1
  6. Under Target resources > Resources (formerly cloud apps) > Include, select All resources (formerly ‘All cloud apps’).
    • If you must exclude specific applications from your policy, you can choose them from the Exclude tab under Select excluded cloud apps and choose Select.1
  7. Under Access controls > Grant:
    • Select Require multifactor authentication, Require device to be marked as compliant, and Require Microsoft Entra hybrid joined device.
    • For multiple controls select Require one of the selected controls.
    • Select Select.1
  8. Confirm your settings and set Enable policy to Report-only.1
  9. Select Create to create to enable your policy. After confirming, move the Enable policy toggle from Report-only to On.1

Note You can enroll your new devices to Intune even if you select Require device to be marked as compliant for All users and All resources (formerly ‘All cloud apps’) using the previous steps. Require device to be marked as compliant control doesn’t block Intune enrollment and the access to the Microsoft Intune Web Company Portal application. 1

MFA grant control by maturity level

Maturity Level Acceptable MFA methods Recommended CA grant control
ML2 Any registered MFA method (push notification, OATH token, SMS OTP) Require multi-factor authentication (or Multifactor authentication strength)
ML3 Phishing-resistant only: FIDO2 key, Windows Hello for Business (TPM), certificate-based MFA, device-bound passkey Require authentication strength → Phishing-resistant MFA

[!NOTE] To use the Require authentication strength grant, the CA policy must be created and assigned with a Microsoft Entra ID P1 (or higher) license. The built-in Phishing-resistant MFA strength is available in all tenants with P1 licensing and requires no additional configuration.4

[!NOTE] Guest and external users: Entra ID cannot register phishing-resistant methods for guests in the resource tenant. If B2B collaboration is in scope, configure a cross-tenant inbound trust in the External Identities settings so that phishing-resistant MFA completed in the guest’s home tenant satisfies the policy in your tenant.3

HOME ← ISM-0843
ISM-1173 →