

Azure AD has a setting that is enabled by default called “ Security Defaults”. When an organization signs up for Microsoft 365, it uses Azure AD as the directory for users. This can lead to misconfigurations and inconsistencies in MFA coverage. However, as shown in this blog post, administrators have a lot of options to consider in terms of how that MFA is applied and where. Oftentimes, if we successfully compromise a credential, MFA can put a stop to any further activities. Microsoft MFA has a few different options for verification:ĭuring offensive engagements, we commonly perform password attacks such as password spraying or credential-based phishing.

More and more organizations are implementing MFA across accounts. Even free Microsoft accounts can use the MFA features. Microsoft 365 and Azure have built-in MFA options. To jump straight to the tool, click here: Microsoft MFA To help both offensive operators and defenders check for MFA coverage on an account, I wrote a tool called MFASweep that attempts to log in to various Microsoft services using a provided set of credentials to identify if MFA is enabled. An organization that is trying to prevent single-factor access to email and/or Azure may need to double-check their configurations to ensure MFA is enforced on all access portals. These endpoints can all be configured under different Conditional Access policy settings, which sometimes lead to variations in how MFA is applied. Across Microsoft 365 and Azure, there are multiple endpoints. On offensive engagements, such as penetration tests and red team assessments, I have been seeing inconsistencies in how MFA is applied to the various Microsoft services.
