What the Required MFA announcement really means.

Поделиться
HTML-код
  • Опубликовано: 4 янв 2025

Комментарии • 71

  • @NTFAQGuy
    @NTFAQGuy  7 месяцев назад +15

    Hey everyone, lets look at what the required MFA update really means! Please make sure to read the description for the chapters and key information about this video and others.
    ⚠ P L E A S E N O T E ⚠
    🔎 If you are looking for content on a particular topic search the channel. If I have something it will be there!
    🕰 I don't discuss future content nor take requests for future content so please don't ask 😇
    🤔 Due to the channel growth and number of people wanting help I no longer can answer or even read questions and they will just stay in the moderation queue never to be seen so please post questions to other sites like Reddit, Microsoft Community Hub etc.
    👂 Translate the captions to your native language via the auto-translate feature in settings! ruclips.net/video/v5b53-PgEmI/видео.html for a demo of using this feature.
    Thanks for watching!
    🤙

  • @Adam-su4re
    @Adam-su4re 7 месяцев назад +11

    Clear explanation of the MFA announcement. Thanks John 👍

    • @NTFAQGuy
      @NTFAQGuy  7 месяцев назад

      Very welcome

  • @NZScottie
    @NZScottie 2 месяца назад

    Nice. I’ll be better prepared with this understanding if something unexpected happens. Thanks John.

  • @gibbo85
    @gibbo85 7 месяцев назад

    Great video, thanks as always John.
    For the KQL, I had to change:
    | where AuthenticationDetails has "SingleFactorAuthentication"
    to
    | where AuthenticationRequirement has "SingleFactorAuthentication"
    i.e.
    SigninLogs
    | where UserDisplayName != ""
    | where UserPrincipalName != ""
    | where (AppDisplayName == "Azure Portal" or AppDisplayName == "Microsoft Azure PowerShell" or AppDisplayName == "Microsoft Azure CLI")
    | where AuthenticationRequirement has "SingleFactorAuthentication"
    | project TimeGenerated, UserDisplayName, UserPrincipalName, AppDisplayName, AuthenticationDetails

  • @MrFirsito
    @MrFirsito 7 месяцев назад +7

    congrats Microsoft, accomplish to yet again making things more complicated
    edit: thanks for the video! great way to explain a rather obscure change

  • @adamr4654
    @adamr4654 7 месяцев назад +1

    Fantastic stuff John thanks for the reply in MS blog post, you have provided more clarity than Microsoft!

  • @VirtualPackets
    @VirtualPackets 7 месяцев назад

    Thanks for the clarification John, makes perfect sense in today world. Already doing all of this :-) so not going to have much of an impact, will keep an eye out for announcement in the portal.

  • @ajayshankasringh
    @ajayshankasringh 7 месяцев назад +2

    Easy to understand, sir, you are a Great teacher 🙏

    • @NTFAQGuy
      @NTFAQGuy  7 месяцев назад

      So nice of you. Thanks!

  • @Bhushimal
    @Bhushimal 5 месяцев назад

    You are really a good Teacher,.Love from India 🎉

    • @NTFAQGuy
      @NTFAQGuy  5 месяцев назад

      Thank you!

  • @butztanx
    @butztanx 7 месяцев назад

    Fantastic content, thanks for taking the time to do these videos. They're very much appreciated.

    • @NTFAQGuy
      @NTFAQGuy  7 месяцев назад

      My pleasure!

  • @dgthekiller
    @dgthekiller 7 месяцев назад +2

    I missed that announcement, great video!
    I find Entra very confusing when it comes to licensing. Especially in mixed entra license environments. It is quite hard to stay license compliant.
    I also wish they would add a entra p2 license step up from p1. Especially those for business premium users.

  • @renatojrestorque6150
    @renatojrestorque6150 7 месяцев назад +3

    Thank you, Chief. This is a great update. 👍👍😉

  • @jonsmallwood1657
    @jonsmallwood1657 7 месяцев назад

    Thanks John. I appreciate your breakdown of their announcement.

  • @jakeindalecio
    @jakeindalecio 7 месяцев назад +3

    Our problem is with Entra SSPR not supporting the external preview. Moving away from the CA custom control for Duo, any verification methods set up for SSPR show up in the list with Duo meaning a user can bypass our policy to use Duo by choosing a voice call or SMS for example. Our MSFT rep is looking into it but hasn't found anything so far.

  • @tony6626
    @tony6626 7 месяцев назад +1

    Great video John.
    Only problem i see here is with our break glass accounts - only accounts excluded from MFA as it stands anyway.

    • @NTFAQGuy
      @NTFAQGuy  7 месяцев назад

      Yep talked about those in the video.

  • @Lethal83
    @Lethal83 7 месяцев назад

    Great video John. Made it very clear and easy to follow as always.

  • @lukebrennan5780
    @lukebrennan5780 7 месяцев назад

    Thanks, Mr NTFAQ. (time flies!). This should have come from the PM's. heh! Really appreciate this.

    • @NTFAQGuy
      @NTFAQGuy  7 месяцев назад +1

      lol. Hey stranger :)

  • @GavinPeters
    @GavinPeters 7 месяцев назад +1

    I'm surprised to hear that the break glass fido recommendation is 2 years old. 6 months ago, I set up PIM with BG accounts and ms documentation definitely still had the two safes method.

  • @suneed1989
    @suneed1989 7 месяцев назад

    Thank you - very well explained 👍

    • @NTFAQGuy
      @NTFAQGuy  7 месяцев назад

      Glad it was helpful!

  • @AzureCloudCowboy
    @AzureCloudCowboy 7 месяцев назад +1

    Awesome as always.

    • @NTFAQGuy
      @NTFAQGuy  7 месяцев назад

      Thank you! Cheers!

  • @jonkilner8816
    @jonkilner8816 7 месяцев назад +1

    So, Microsoft are releasing a feature in July that affects authentication, you can't opt out of, with a half baked attempt at communicating the change in a blog post.....and they're still gathering feedback.
    I know you say it won't happen all at once. But what if my tenant is among the first batch to have the change applied. Then it's happening in just over a month and we' don't know the full scope of the change.
    Seems to me like something's happening in the background and there's a big rush to get this change out.
    We've only recently had the Microsoft managed conditional access policy rollout, which had better communication and planning wrapped around it, so you could measure its impact and deploy your own version of the policy if required

  • @yulaw3289
    @yulaw3289 7 месяцев назад

    enjoying this video for today learning, thanks a lot!

    • @NTFAQGuy
      @NTFAQGuy  7 месяцев назад

      Glad you enjoyed it!

  • @jlou65535
    @jlou65535 7 месяцев назад

    Clear explanation as usual !

    • @NTFAQGuy
      @NTFAQGuy  7 месяцев назад

      Glad it was helpful!

  • @LifeisbetterwithaMalinois
    @LifeisbetterwithaMalinois 7 месяцев назад +1

    Thxs sir John😊

    • @NTFAQGuy
      @NTFAQGuy  7 месяцев назад

      Welcome 😊

  • @AHumanMale
    @AHumanMale 7 месяцев назад

    "That's wrong... don't do that." Good advice! 🙂

  • @twistedaus
    @twistedaus 6 месяцев назад

    Great video as usual. Microsoft have really sh*t the bed with this one....

  • @GiovanniOrlandoi7
    @GiovanniOrlandoi7 7 месяцев назад

    Thanks for the video!

    • @NTFAQGuy
      @NTFAQGuy  7 месяцев назад

      You're welcome!

  • @GavinPeters
    @GavinPeters 7 месяцев назад

    Hmm, i wonder how this affects resources. I need to check our Teams-room set up as we use CA to remove mfa need. I'm not sure if they're set up a user accounts or not.

    • @GavinPeters
      @GavinPeters 7 месяцев назад

      Oops, nevermind, I just realised that we don't manage anything using the room logins. This does not affect our resources, as per John's teachings.

  • @tajammulrizvi9504
    @tajammulrizvi9504 7 месяцев назад

    Really useful Session.

    • @NTFAQGuy
      @NTFAQGuy  7 месяцев назад

      Glad to hear that!

  • @markdriver8511
    @markdriver8511 7 месяцев назад

    Great video thanks :-)

  • @jadan2000
    @jadan2000 7 месяцев назад +1

    Thanks for this. Currently if you turn on MFA in Azure, it also is turned on for o365, since its the same identity management. Does that change with this new feature?

    • @NTFAQGuy
      @NTFAQGuy  7 месяцев назад +1

      MFA requirement is based on the target service. Just because a user has setup MFA does not mean its now required for everything. This only applies to those services I talk about in the video.

  • @timolean5846
    @timolean5846 7 месяцев назад

    So if you create service accounts as users to avoid mfa you’ll want to switch to using service principals? Currently we just exclude them from our CA policies.

    • @NTFAQGuy
      @NTFAQGuy  7 месяцев назад +1

      You shouldn't be creating user accounts for service accounts. Yes, use service principal.

  • @ikennashonowo9250
    @ikennashonowo9250 7 месяцев назад

    Nice

  • @jadan2000
    @jadan2000 7 месяцев назад

    Also. If I'm using Conditional access policies for MFA and I have users in the exceptions list, will they now be required to use MFA?

    • @NTFAQGuy
      @NTFAQGuy  7 месяцев назад +4

      I address this in the video. Yes, its cumulative.

    • @jadan2000
      @jadan2000 7 месяцев назад

      @NTFAQGuy I must have missed that part. Thank you. Wow that's a bit painful.

  • @robertsprouse8903
    @robertsprouse8903 7 месяцев назад

    Guess I need to buy stock in FIDO keys. Where I work no cell phones are allowed.

  • @skatterbrainz
    @skatterbrainz 7 месяцев назад +2

    "carbon-based fleshy things" - lol!

  • @Timmy-Hi5
    @Timmy-Hi5 7 месяцев назад +1

    seems that Superman is angry today 😁or the mic is on max loudness 🤩 or MFA makes him angry 😎😁

    • @NTFAQGuy
      @NTFAQGuy  7 месяцев назад +1

      ROFL, didn't notice

    • @Timmy-Hi5
      @Timmy-Hi5 7 месяцев назад +1

      @@NTFAQGuy 😁 all good ...I was under the impression someone stole your doughnut allowance 😁

    • @NTFAQGuy
      @NTFAQGuy  7 месяцев назад +1

      I would pity that person :-D

    • @Timmy-Hi5
      @Timmy-Hi5 7 месяцев назад

      @@NTFAQGuy 😂

  • @DavidWorthington
    @DavidWorthington 7 месяцев назад

    It’s a good thing. “Who moved my cheese” shouldn’t apply here.

  • @ZATennisFan
    @ZATennisFan 7 месяцев назад +1

    It was not the most clearly written post of all time. Especially if you are not an EntraID junkie…. 🤣🤣

    • @NTFAQGuy
      @NTFAQGuy  7 месяцев назад

      lol

    • @ZATennisFan
      @ZATennisFan 7 месяцев назад +1

      @@NTFAQGuyThere was a great deal of wailing and gnashing of teeth by some of my colleagues 🤣🤣

    • @NTFAQGuy
      @NTFAQGuy  7 месяцев назад

      hahahahaha

  • @shawndeggans
    @shawndeggans 7 месяцев назад

    I guess carbon-based fleshy things is better than meat-bags.