Implementation guidance for Australian Essential Eight controls in Microsoft environments - ISM controls with PSPF mappings
| Property | Value |
|---|---|
| ISM Control | ISM-0974 |
| Revision | 6 |
| Updated | Sep-21 |
| Guideline | Not provided |
| Section | Authentication hardening |
| Topic | Multi-factor authentication |
| Essential Eight | ML2, ML3 |
| PSPF Levels | NC, OS, P, S, TS |
Multi-factor authentication is used to authenticate unprivileged users, mitigating credential theft by enforcing a Conditional Access policy in Microsoft Entra ID that requires MFA at sign-in1. The policy can combine MFA with additional controls, such as device compliance and hybrid join, to strengthen access security2.
The Conditional Access grant control used should align with the required maturity level. At Maturity Level 2, the standard Require multi-factor authentication grant (or the built-in Multifactor authentication strength) is sufficient. At Maturity Level 3, the grant must be changed to Require authentication strength → Phishing-resistant MFA, which restricts acceptable methods to FIDO2 security keys, Windows Hello for Business (hardware TPM), certificate-based authentication, or device-bound passkeys — and excludes SMS OTP, push notifications, and OATH tokens.34
Not provided in source documentation.
[!NOTE] The Conditional Access policy requiring multifactor authentication will be created in the Entra ID Portal to enforce MFA for user sign-ins. It will apply the grant control Require multifactor authentication to all users accessing all resources.
Note You can enroll your new devices to Intune even if you select Require device to be marked as compliant for All users and All resources (formerly ‘All cloud apps’) using the previous steps. Require device to be marked as compliant control doesn’t block Intune enrollment and the access to the Microsoft Intune Web Company Portal application. 1
| Maturity Level | Acceptable MFA methods | Recommended CA grant control |
|---|---|---|
| ML2 | Any registered MFA method (push notification, OATH token, SMS OTP) | Require multi-factor authentication (or Multifactor authentication strength) |
| ML3 | Phishing-resistant only: FIDO2 key, Windows Hello for Business (TPM), certificate-based MFA, device-bound passkey | Require authentication strength → Phishing-resistant MFA |
[!NOTE] To use the Require authentication strength grant, the CA policy must be created and assigned with a Microsoft Entra ID P1 (or higher) license. The built-in Phishing-resistant MFA strength is available in all tenants with P1 licensing and requires no additional configuration.4
[!NOTE] Guest and external users: Entra ID cannot register phishing-resistant methods for guests in the resource tenant. If B2B collaboration is in scope, configure a cross-tenant inbound trust in the External Identities settings so that phishing-resistant MFA completed in the guest’s home tenant satisfies the policy in your tenant.3
Configure Essential Eight MFA conditional access policies — Microsoft Learn ↩ ↩2 ↩3 ↩4 ↩5 ↩6 ↩7 ↩8 ↩9 ↩10 ↩11
Require compliant device, Entra hybrid joined device, or MFA for all users — Microsoft Learn ↩ ↩2 ↩3
Step 3: Protect your Microsoft 365 user accounts — Microsoft Learn ↩
Get started with phishing-resistant passwordless authentication deployment in Microsoft Entra ID — Microsoft Learn ↩ ↩2