Your company has an Azure subscription.
You enable multi-factor authentication (MFA) for all users.
The company's help desk reports an increase in calls from users who receive MFA requests while they work from the company's main office.
You need to prevent the users from receiving MFA requests when they sign in from the main office.
What should you do?
Click on the arrows to vote for the correct answer
A. B. C. D.B
The first thing you may want to do, before enabling Multi-Factor Authentication for any users, is to consider configuring some of the available settings. One of the most important features is a trusted IPs list. This will allow you to whitelist a range of IPs for your network. This way, when users are in the office, they will not get prompted with MFA, and when they take their devices elsewhere, they will. Here's how to do it:
Log in to your Azure Portal.
Navigate to Azure AD > Conditional Access > Named locations.
From the top toolbar select Configure MFA trusted IPs.
https://www.kraftkennedy.com/implementing-azure-multi-factor-authentication/The correct answer is A. From Conditional access in Azure Active Directory (Azure AD), create a named location.
Explanation:
Multi-Factor Authentication (MFA) is a security feature that requires users to provide additional authentication factors such as a verification code sent to their phone or an authenticator app when signing in to Azure services. It is an essential security measure for protecting the organization's resources and sensitive data.
However, MFA requests can cause frustration for users, especially when they are signing in from a trusted location, such as the company's main office. To prevent users from receiving MFA requests when signing in from the main office, we need to create a named location in Azure Active Directory (Azure AD) and exclude it from MFA requirements.
Here are the steps to create a named location and exclude it from MFA requests:
Sign in to the Azure portal (https://portal.azure.com) with an account that has the Global Administrator or Conditional Access Administrator role.
In the left navigation menu, select Azure Active Directory.
In the Azure Active Directory pane, select Conditional Access under the Security section.
In the Conditional Access pane, select Named locations under the Policies section.
Select New named location to create a new named location.
Enter a name for the named location, such as "Main Office."
In the IP address range section, enter the IP address range of the main office network. You can use CIDR notation to specify a range of IP addresses. For example, if the main office network has the IP address range of 10.0.0.0/24, enter 10.0.0.0/24.
Save the named location.
Create a new Conditional Access policy or edit an existing policy that requires MFA.
In the Access controls section of the policy, select Grant under Access controls.
In the Grant section, select Exclude.
In the Exclude tab, select the named location that you created in step 6.
Save the Conditional Access policy.
By creating a named location and excluding it from MFA requirements, users who sign in from the main office will not receive MFA requests. However, they will still be required to provide additional authentication factors when signing in from other locations to ensure the security of the organization's resources and data.