Sep 04 2019 05:27 AM - last edited on Nov 29 2021 09:17 AM by Allen
Sep 04 2019 05:27 AM - last edited on Nov 29 2021 09:17 AM by Allen
Hi Everyone, we have an Azure emergency account that is not enabled for MFA and therefor this user shows up on the "MFA should be enabled on accounts with owner permissions on your subscription" Warning. Is there a way to exclude just a single user from this policy or do I have to disable this security completely?
Regards,
Gunter
Sep 04 2019 06:29 AM
SolutionHello @Gunter Danzeisen
you cannot exclude the account from the policy.
On the other hand, I always suggest other ways to bypass the MFA.
one way is to create a trusted location in conditional access or just add the trusted IPs at the Office 365 MFA page. Then create a rule for this account to exclude MFA on trusted locations.
An other way is to create a "back door" account, as Dr Nestori suggests : http://o365blog.com/post/aadbackdoor/
Mar 05 2020 05:56 AM
I have a similar issue, but in my case I have enabled the third party MFA -DUO in my Azure subscription. But still it shows "MFA should be enabled on accounts with owner permissions on your subscription".
Is there any method to bypass or any settings available in the azure portal.
Thanks
Sreejith.G
Mar 08 2020 01:19 AM
Hi @gsreejith
If your question is: "How can I tune ASC to stop showing recommendations I deem as false positive?", then there is a way how you can edit ASC security policy and turn off specific parts (e.g. MFA for owners), so you won't see related recommendations in the Compliance center anymore.
Dec 14 2020 10:48 AM
Sep 04 2019 06:29 AM
SolutionHello @Gunter Danzeisen
you cannot exclude the account from the policy.
On the other hand, I always suggest other ways to bypass the MFA.
one way is to create a trusted location in conditional access or just add the trusted IPs at the Office 365 MFA page. Then create a rule for this account to exclude MFA on trusted locations.
An other way is to create a "back door" account, as Dr Nestori suggests : http://o365blog.com/post/aadbackdoor/