Microsoft Entra Conditional Access for administrator roles requires phishing-resistant MFA authentication strength on All applications. Disabled policies are ignored; report-only policies aren't considered. Policies with custom strengths require review to confirm they are truly phishing-resistant.
Risk
Without phishing-resistant MFA on admin accounts, attackers can:
- Bypass OTP/push via AiTM phishing
- Abuse MFA fatigue to gain sessions
- Perform tenant takeover, alter policies, and exfiltrate data
This harms confidentiality, configuration integrity, and service availability.
prowler m365 --checks entra_admin_users_phishing_resistant_mfa_enabled
Recommendation
Require Phishing-resistant MFA via Conditional Access for all privileged roles and All resources. Favor FIDO2, Windows Hello for Business, or certificate-based auth. Apply least privilege, use PIM for step-up on role activation, test in report-only, and keep a monitored break-glass account.
Remediation
- Sign in to Microsoft Entra admin center (https://entra.microsoft.com)
- Go to Entra ID > Conditional Access > Policies > New policy
- Users > Include > Directory roles > select Global Administrator (or the admin roles you require)
- Target resources > Resources (cloud apps) > Include > All cloud apps; ensure Exclude is empty
- Grant > Grant access > Require authentication strength > select Phishing-resistant MFA > Select
- Enable policy: On
- Click Create
Source Code
Resource Type
NotDefined
References
- https://blog.admindroid.com/use-phishing-resistant-mfa-to-implement-stronger-mfa-authentication/
- https://learn.microsoft.com/en-us/entra/identity/conditional-access/policy-admin-phish-resistant-mfa#create-a-conditional-access-policy
- https://docs.azure.cn/en-us/entra/identity/conditional-access/policy-guests-mfa-strength
- https://learn.microsoft.com/en-us/entra/identity/conditional-access/policy-admin-phish-resistant-mfa