Forum Discussion
Conditional Access vs enable MFA
That's the expected behavior. If you enable it via the MFA page, it will always require MFA, the only exception being users logging from "trusted IPs". So it's a good way to have an "always on" configuration for your most sensitive users. If you want flexibility/better customization, use CA policies - this is the recommended method nowadays.
- Neil GoldsteinJun 04, 2019Iron Contributor
Are you aware of any instructions for converting from cloud only "enable MFA" to cloud only "Conditional Access MFA"?
Thanks!
-Neil
- jerome317Jun 09, 2019Brass Contributor
Neil Goldstein
One advantage of using just CA policies: User won't have to set up App Passwords for Legacy Apps. I think iirc, App Passwords are required if you use Enable MFA for apps like Outlook and Skype, even PowerShell... make sure one account doesn't have MFA enable just in case there is another MFA outage (follow best practice for non-MFA account, i.e. setup CA policy for trusted IPs only).Additionally, you'd want to create a few CA policies to avoid compromise accounts... yes, it is nice not to deal with App Passwords, but then attackers can use Outlook to login as bypass to MFA. So set CA policies for that, like block if sign in is from high risk location/countries or not included in trusted IP/location.
- VasilMichevJun 05, 2019MVP
It's as simple as toggling the settings in the MFA portal and configuring a CA Policy. Personally, I still run with both MFA and CA configured, I've simply added an exception (trusted IPs) to my MFA config.
- Jason BenwayMay 31, 2019Iron Contributorthank you, do you know if using conditional access counts toward the security score?
- VasilMichevJun 02, 2019MVP
The score is just and arbitrary number, the important thing is the action not whether it increases the score :)