Starting in July, Microsoft will begin gradually enforcing multi-factor authentication for all users signing into Azure to administer resources.
After first completing the rollout for the Azure portal, the MFA enforcement will see a similar rollout for CLI, PowerShell, and Terraform.
Redmond says customers will also receive additional information via email and official notifications before the MFA enforcement.
Microsoft also urged admins to enable MFA in their tenants before the rollout using the MFA wizard for Microsoft Entra.
They can also monitor which users have registered for MFA using the authentication methods registration report and this PowerShell script to get a report of the MFA state across the entire user base.
According to a Microsoft study focused on analyzing the security performance of MFA methods across a large dataset of Azure Active Directory users exhibiting suspicious activity, MFA offers a big boost of protection for user accounts against cyberattacks, with over 99.99% of all MFA-enabled accounts resisting hacking attempts.
As the company's analysts further found, MFA also reduces the risk of compromise by 98.56%, even when the attackers attempted to breach accounts using stolen credentials.
This comes after Redmond announced in November that it would soon roll out Conditional Access policies requiring MFA for all admins when signing into Microsoft admin portals, for users on all cloud apps, and for high-risk sign-ins.
As part of the same move to boost MFA adoption, Microsoft-owned GitHub also requires all active developers to enable two-factor authentication beginning January 2024.
Get up to date on Microsoft Azure with $77 off this training bundle.
Train for Microsoft certifications with $350 off this course bundle.
Get up to speed on Microsoft Azure with an extra 20% off this bundle.
Windows Quick Assist abused in Black Basta ransomware attacks.
This Cyber News was published on www.bleepingcomputer.com. Publication date: Sat, 18 May 2024 08:05:06 +0000