Security News > 2023 > November > Microsoft introduces new access policies in Entra to boost MFA usage
As part of a broader initiative to strengthen security, Microsoft is rolling out Microsoft-managed Conditional Access policies in Entra ID to increase the use of multifactor authentication for enterprise accounts.
Microsoft Entra Conditional Access policies are built with the current threat landscape in mind and with the objective to "Automatically protect tenants based on risk signals, licensing, and usage."
The policies will rolled out and visible for 90 days before be turned on by default and customers will be able to adjust them as preferred or disable them altogether.
"You can view the policies and their impact using the new policy view user experience, which includes a policy summary, alerts, recommended actions, and a policy impact summary. You can also monitor them using sign-in and audit logs," said Alex Weinert, VP director of identity security at Microsoft.
"You can customize the policies by excluding users, groups, or roles that you want to be exceptions, such as emergency and break glass accounts. If you require more extensive customizations, you can clone a policy and then make as many changes as you want."
"Today, many customers use security defaults, but many others need more granular control than security defaults offer. Customers may not be in a position to disable legacy authentication for certain accounts, or they may need to make exceptions for certain automation cases. Conditional Access does a great job here, but often customers aren't sure where to start. They've told us they want a clear policy recommendation that's easy to deploy but still customizable to their specific needs. And that's exactly what we're providing with Microsoft-managed Conditional Access policies," Weinert explained.
News URL
https://www.helpnetsecurity.com/2023/11/07/microsoft-entra-policies-mfa/