Manage MFA for Users
Start course
1h 1m

This course has been designed to teach you how to manage Microsoft 365 access and authentication. The content in this course will help prepare you for the Microsoft 365 Identity and Services exam.

The topics covered within this course include:

  • Managing Authentication
  • Implementing Multi-Factor Authentication
  • Configuring Application Access
  • Implementing Access for External Users of Microsoft 365 Workloads

Learning Objectives

  • To learn how to configure and monitor authentication
  • To learn how to administer MFA and report on its utilization
  • To learn how to configure application registration and use Azure AD Application Proxy
  • To learn how to use Azure Active Directory B2B to add and manage external users

Intended Audience

  • Those who are preparing for the Microsoft 365 Identity and Services exam
  • Those looking to learn more about Microsoft 365


To get the most from this course, you should at least be familiar with the Microsoft 365 offering and have a general understanding of its features.


In this demonstration we're going to perform some basic MFA management for one of our users. What we'll do is require Lester Murphy to re-provide his contact methods. Ahead of this demonstration, I set up Lester Murphy in my Azure AD to use MFA. Before we make any changes, let's open an incognito browser window here and log in as Lester so you can see how MFA login works before we force him to re-provide his contact info. As you could see here when I log in as Lester, I'm prompted for a verification code which was sent to my phone that was set up earlier. This is normal operation of MFA when configured to use SMS text. Let's see what happens when we force Lester to re-provide his contact information. To get started, let's switch back over to our Azure Portal and click over here on Azure Active Directory. What we want to do is manage MFA settings. So we'll click users. And then, we'll ensure that we are in the all users pane. On the right side here, let's click multi-factor authentication on the toolbar along the top to open the multi-factor authentication page. Let's check the box next to Lester's account so we can configure settings for his account only. From here we can begin managing Lester's settings by selecting manage user settings. For this exercise, we're going to force Lester to provide his contact methods again. Let's save our settings and then close out. Now that I've configured MFA to force Lester to re-provide his contact methods, let's see what happens when we log in with his account. To do so, let's open an incognito window and log in as Lester. As you can see on your screen, Lester is no longer prompted to just supply a verification code. He is actually being prompted to re-provide his phone information instead. This confirms that our MFA changes for Lester have had the desired effect.


LECTURES: Course Introduction - What is Authentication - Designing an Authentication Method - Configuring Multi-Factor Authentication - Accessing MFA Service Settings - Enable SSPR - Sign-in Activity Reports in the Azure Active Directory Portal - Using Sign-in Activity Reports in the Azure Active Directory Portal - Azure Active Directory Monitoring - Implement MFA - Manage User Settings with Azure Multi-Factor Authentication in the Cloud - Manage MFA for Users - Reports in Azure Multi-Factor Authentication - Configure Application Registration in Azure AD - How to Configure Application Registration in Azure AD - What is Azure AD Application Proxy - Configure Azure AD Application Proxy - Azure Active Directory B2B - Add Guest Users to Your Directory in the Azure Portal - Conclusion

About the Author
Learning Paths

Tom is a 25+ year veteran of the IT industry, having worked in environments as large as 40k seats and as small as 50 seats. Throughout the course of a long an interesting career, he has built an in-depth skillset that spans numerous IT disciplines. Tom has designed and architected small, large, and global IT solutions.

In addition to the Cloud Platform and Infrastructure MCSE certification, Tom also carries several other Microsoft certifications. His ability to see things from a strategic perspective allows Tom to architect solutions that closely align with business needs.

In his spare time, Tom enjoys camping, fishing, and playing poker.