Jul 15 2019 02:16 AM
Microsoft makes a strong case that all Azure Active Directory accounts should be protected with multi-factor authentication (MFA). That’s a great aspiration, but the immediate priority is to check accounts holding admin roles. This post explains how to use a PowerShell script to find and report those accounts.
https://office365itpros.com/2019/07/15/finding-azure-active-directory-not-protected-with-mfa/
Jul 16 2019 09:19 AM
@Tony Redmondcan please see the below link to check the users with and without MFA
https://office365itpros.com/2018/11/21/reporting-mfa-enabled-accounts/
Jul 16 2019 09:25 AM
The text of the post says: "We discussed reporting of MFA-enabled accounts previously,"
I posted the script you reference in that link.