• Admin2@ .onMicrosoft.com In the ACTIVE DIRECTORY
  • Per Enabled User Select the Directory called is set to Click CREATE Click MANAGE
  • Configure
  • ACTIVE DIRECTORY
  • Sign-in allowed users Select Aldo Muller
  • AldoM When prompted click Set it up now
  • Task Detailed Steps




    Download 78,77 Kb.
    bet2/8
    Sana22.07.2021
    Hajmi78,77 Kb.
    #15678
    1   2   3   4   5   6   7   8

    Enable MFA for a User


    Task

    Detailed Steps



    Complete these steps from an internet-connected Windows computer.

    Create an MFA provider and view the options found in the MFA Admin Console

    Bring up the browser session with the Microsoft Azure Management Portal, and sign in as Admin2@.onMicrosoft.com


    1. In the ACTIVE DIRECTORY workspace, select the Contoso… directory

    2. Click MULTI-FACTOR AUTH PROVIDERS

    3. Click CREATE A NEW MULTI-FACTOR AUTHENTICATION PROVIDER

    4. Enter the name MFA

    5. Ensure that the Usage Model is set to Per Enabled User

    6. Select the Directory called is set to

    7. Click CREATE

    8. Click MANAGE (bottom toolbar)

    9. On the left menu, under User Administration, click Block/Unblock Users - this section allows administrators to unblock user accounts after a potential fraud alert (note also a number of reports are available that relate to this)

    10. Click One-Time Bypass – here administrators can configure users to authenticate once without MFA – the bypass is temporary and expires after a specified number of seconds and a reason can be recorded for reporting purposes

    11. On the left menu, under Configure, click Settings – this section allows organizations to customize the MFA experience

    12. Click Caching – here you can configure it so that once a user has successfully authenticated using MFA, subsequent authentication attempts for a set number of seconds will automatically succeed without MFA, and this can be per user across all applications, per user for a specific application name and authentication type, or all of these plus the same IP address – otherwise MFA will be required again

    13. Click Notifications - this section allows organizations to set up notification messages to specified email addresses - these can be configured for Fraud Alerts, One-Time Bypasses, and Account Lockouts

    Enable MFA for a specific user

    1. Return to the Microsoft Azure Management Portal Internet Explorer tab

    1. In the ACTIVE DIRECTORY workspace, click the Contoso… directory

    2. Click Users

    3. Click MANAGE MULTI-FACTOR AUTH (at the bottom)

    4. Click the View drop-down and notice that you can apply this to sensitive roles automatically for example to all global administrators

    5. Click the View drop-down and select Sign-in allowed users

    6. Select Aldo Muller and click Enable

    7. Click enable multi-factor auth

    8. Click close

    9. Select Aldo Muller and click Enforce

    10. Click enforce multi-factor auth

    11. Click close

    User MFA experience

    1. Open Internet Explorer in InPrivate Browsing mode and navigate to https://myapps.microsoft.com and sign in as AldoM

    1. When prompted click Set it up now to set up multi-factor authentication, noting the different authentication methods

    2. Select your country and enter your phone number (you can use your real mobile number) and select the desired Method (Send text message/Call me), then click Contact me

    3. Complete the verification process (ignore the app password for now, we will look at this in a later lab)

    4. Sign out and sign in as AldoM again

    5. You are sent a verification code via your chosen method – complete the verification and complete the sign in

    6. Sign out

    Reporting on MFA

    1. Return to the Microsoft Azure Management Portal Internet Explorer tab

    1. In the ACTIVE DIRECTORY workspace, select the Contoso… directory

    2. Click MULTI-FACTOR AUTH PROVIDERS

    3. Click MANAGE

    4. Click VIEW A REPORT (or Usage on the left) - you have the following reports: Summary, User Summary, and User Details

    5. Click User Summary - notice that you can filter the information displayed in the report

    6. Click Run – the report is now in the queue and will be accessible once complete

    7. Click Queued

    8. Locate the report you just created and click View – this report lists an in-depth summary of the MFA requests made by particular users within a set time range

    9. Close the Multi-Factor Authentication tab



    Download 78,77 Kb.
    1   2   3   4   5   6   7   8




    Download 78,77 Kb.