How to Set Up Multi-Factor Authentication (MFA) in Microsoft 365
Multi-factor authentication is the single most impactful security control you can implement for Microsoft 365. MFA blocks over 99% of account takeover attacks caused by stolen credentials. This guide explains the correct way to set up MFA in M365 — using Conditional Access rather than legacy per-user MFA settings.
Overview
MFA blocks 99%+ of account takeover attacks from stolen credentials. In Microsoft 365, MFA should be enforced through Conditional Access (available in M365 Business Premium), which also blocks legacy authentication bypass. Microsoft Authenticator with number matching is the recommended MFA method for business users. Admin accounts should use phishing-resistant MFA.
Learn about M365 securityWhy MFA Is Essential for Microsoft 365
The majority of Microsoft 365 account compromises involve stolen or guessed passwords. Phishing campaigns harvest credentials at scale, credential stuffing attacks try passwords leaked from other services, and password spray attacks try common passwords against large numbers of accounts. A stolen password alone is enough to access an M365 account without MFA — with MFA, that stolen password is useless to an attacker.
Microsoft reports that MFA blocks over 99% of account takeover attacks. The NCSC recommends MFA as one of the most important cybersecurity controls for any organisation. Stolen or compromised credentials were the initial attack vector in 22% of data breaches globally in 2024, making credential protection through MFA directly relevant to most breach scenarios.
How MFA Works in Microsoft 365
When MFA is required, signing in to Microsoft 365 involves two steps: entering the password, then completing a second verification. The second factor can be: an approval prompt in the Microsoft Authenticator app (recommended); a time-based one-time code (TOTP) from an authenticator app; a phone call; an SMS code (less secure, but better than no MFA); or a hardware security key (FIDO2 standard — the most secure option).
Microsoft Authenticator is the recommended MFA method for most business users. It supports number matching — the user must enter a number shown on the login screen into the app, preventing simple MFA fatigue attacks where attackers bombard users with approval prompts hoping for an accidental approval. It also shows the location and application requesting access, helping users identify suspicious requests.
The Right Way to Enable MFA: Conditional Access
Microsoft 365 provides two mechanisms for enabling MFA: legacy per-user MFA settings (accessed through the user management portal) and Conditional Access policies (available with Entra ID P1, included in M365 Business Premium). AMVIA recommends Conditional Access for several important reasons.
Legacy per-user MFA settings are applied inconsistently and can be bypassed. Legacy email protocols — IMAP, POP3, basic SMTP authentication — do not support MFA and will authenticate using just a password regardless of per-user MFA settings. Conditional Access can block these legacy protocols entirely, eliminating this bypass. Conditional Access also allows more granular policy — requiring MFA for all applications, requiring step-up authentication for admin actions, and applying risk-based policies that require MFA when a sign-in looks suspicious.
For businesses on M365 Business Basic or Standard (which do not include Entra ID P1), Security Defaults provides a simplified set of pre-configured policies that enforce MFA for all users and block legacy authentication — a significant improvement over no MFA, though less flexible than full Conditional Access.
Protecting Admin Accounts
Admin accounts are the highest-value targets in any Microsoft 365 environment — a compromised Global Admin account gives an attacker unrestricted access to the entire tenant. Admin accounts should receive stronger MFA than standard user accounts.
AMVIA recommends phishing-resistant MFA for all admin accounts — either FIDO2 hardware security keys or Windows Hello for Business. Unlike app-based MFA, phishing-resistant MFA cannot be intercepted through adversary-in-the-middle attacks. Combined with Privileged Identity Management (PIM), which limits admin role activation to specific, time-limited sessions with approval workflow, admin accounts are significantly more resistant to compromise.
Handling MFA Rollout
Rolling out MFA to an existing Microsoft 365 environment requires careful planning to avoid disrupting users. AMVIA recommends: communicating to staff what is changing and why; using Conditional Access in report-only mode first to understand the impact; deploying Microsoft Authenticator to all users before enforcement; testing with a pilot group; then progressively expanding to the full user population. Common issues during rollout include users without smartphones needing an alternative second factor, and applications that use legacy authentication needing to be identified and addressed before legacy authentication blocking is enforced.
Key Considerations for UK SMEs
- Enforce MFA through Conditional Access, not per-user settings — Conditional Access is more reliable and adds additional controls
- Block legacy authentication simultaneously with MFA enforcement — this eliminates the most common bypass
- Deploy Microsoft Authenticator with number matching enabled — more resistant to MFA fatigue attacks than SMS
- Apply phishing-resistant MFA (FIDO2 or Windows Hello) to admin accounts
- Communicate the rollout to staff in advance — MFA prompts without warning create helpdesk volume and user frustration
How AMVIA Can Help
AMVIA deploys and manages MFA for UK businesses as part of its Microsoft 365 security service. We configure Conditional Access policies, deploy Microsoft Authenticator to all user devices, manage the rollout process to minimise disruption, and handle helpdesk support for MFA-related issues. For businesses that need hardware security keys for admin accounts, AMVIA can procure and configure FIDO2 keys. Contact AMVIA on 0333 733 8050.
Key Points
What UK businesses need to know about MFA in Microsoft 365.
MFA Is the Most Important Control
Stolen or compromised credentials were the initial attack vector in 22% of data breaches in 2024 (Verizon DBIR 2025). MFA makes stolen passwords useless without the second factor.
Use Conditional Access, Not Per-User MFA
Legacy per-user MFA settings can be bypassed through legacy authentication protocols. Conditional Access enforces MFA reliably and blocks legacy authentication simultaneously.
Microsoft Authenticator Is the Right App
Microsoft Authenticator provides number matching and additional context in MFA prompts — making MFA fatigue attacks harder than SMS codes.
Admin Accounts Need Stronger MFA
Admin accounts are the highest-value target. Phishing-resistant MFA (FIDO2 keys or Windows Hello) and PIM should be applied to all privileged accounts.
MFA Rollout Checklist
Microsoft Authenticator deployed to all users before MFA enforcement
Conditional Access policy created — MFA required for all users, all applications
Number matching enabled in Authenticator — prevents MFA fatigue attacks
Legacy authentication blocked via Conditional Access
Service accounts and shared accounts identified and handled before enforcement
Admin accounts — phishing-resistant MFA (FIDO2 or Windows Hello) configured
Frequently Asked Questions
Yes, but SMS-based MFA is less secure than app-based MFA. SMS messages can be intercepted through SIM swapping attacks, and SMS codes can be replayed in real-time by attackers using adversary-in-the-middle phishing. Microsoft Authenticator with number matching is significantly more resistant to these attacks. AMVIA recommends Authenticator app MFA as the standard, with SMS as a fallback for staff who cannot use a smartphone for work purposes.
Service accounts and shared mailboxes that use automated authentication may be affected by MFA enforcement. AMVIA identifies these accounts during the rollout planning phase. Options include: excluding specific service accounts from MFA policies (with careful documentation of the security risk accepted); configuring application passwords for legacy applications; using managed identities for Azure-connected services; or migrating to modern authentication methods. Shared mailboxes in Exchange Online accessed by multiple users are typically handled through delegate access rather than shared credentials.
MFA fatigue (push bombing) involves attackers bombarding a user's phone with repeated MFA approval requests, hoping the user approves one accidentally. Enabling number matching in Microsoft Authenticator prevents this — the user must enter a specific number shown on the login screen, which the attacker cannot know. Microsoft Authenticator also shows the application and location of the request, helping users identify requests they did not initiate.
Get MFA Properly Deployed
AMVIA deploys Microsoft 365 MFA correctly — Conditional Access policies, Microsoft Authenticator rollout, and legacy authentication blocking to close all bypass routes.
Related Resources
Conditional Access Guide
The correct mechanism for enforcing MFA and device compliance in M365.
Microsoft 365 Security Guide
MFA as part of a complete M365 security strategy for UK businesses.
Zero Trust Security
MFA is the foundation of zero trust — every access request verified, every time.