You are responsible for the Office 365 security in your organization.
You have an Azure AD tenant on the free tier.
You have enforced multi-factor authentication by enabling Security Defaults for all users.
You want to add your on-premise IP range as a trusted IP, to bypass MFA request when working from the office.
What should you do?
Click on the arrows to vote for the correct answer
A. B. C. D.Correct Answer: C
Adding trusted IP-ranges requires your tenant to be on the Azure Premium P1 or Azure Premium P2 license.
The only way to enforce MFA on users with non-administrator roles in an Azure AD Free tenant is by enabling Security Defaults.
But as displayed by the exhibit below, Trusted IP is not available on the free tier.
Option A is incorrect.
This is where you configure the trusted IP settings, but in this scenario you must first upgrade Azure AD to a paid tier.
Option B is incorrect.
Creating a security group is not correct.
Option D is incorrect.
Conditional Access policies requires an Azure AD P1/P2 license.
The correct answer for this question is D. Create a conditional access policy.
Explanation: When Security Defaults are enabled for an Azure AD tenant, it enforces MFA for all users, which means that users need to provide an additional factor of authentication (such as a code or biometric authentication) to access their accounts. However, there may be certain situations where users should be exempt from MFA, such as when they are accessing their accounts from a trusted location, such as the office.
To allow users to bypass MFA when accessing Office 365 from a trusted location, you can create a conditional access policy in Azure AD. A conditional access policy allows you to set rules that determine when and how users can access Office 365. In this case, you would create a policy that allows users to bypass MFA when they are accessing Office 365 from a specific IP range (such as the office IP range).
To create a conditional access policy, follow these steps:
This policy will allow users to access Office 365 from your office IP range without requiring MFA. Note that this policy will only apply to users who are members of the groups that you selected in step 7.