Home About Tools Projects Guides & Blog ⚡ Hire Me ✦ Websites Contact →
🔒 M365 Security

How to Enable MFA for All Users in Microsoft 365

Published 20 March 2026

Enabling MFA across your Microsoft 365 tenant is one of the single most impactful security changes you can make. Microsoft reports that MFA blocks over 99% of automated account attacks. A stolen password alone is not enough if the attacker also needs a second factor from a device the user controls.

There are three ways to enable MFA in Microsoft 365 - Security Defaults, per-user MFA, and Conditional Access. Which one you use depends on your licence and how much control you need.

The Three Methods Compared

📈 Overview
MethodLicence neededGranularityRecommended
Security DefaultsAny M365 planAll or nothingSmall orgs, no Entra P1
Per-user MFAAny M365 planPer userLegacy fallback only
Conditional AccessEntra ID P1+Full controlYes, for most orgs

Option 1: Security Defaults

🛠️ Security Defaults

Security Defaults are a set of pre-configured baseline security settings Microsoft enables for new tenants. When turned on, all users are required to register for MFA within 14 days and must complete MFA when signing in. Admins are always required to MFA.

Toggle Security defaults to Enabled and save. All users will see a prompt to register MFA on their next sign-in.

⚠️
Security Defaults and Conditional Access cannot run together
If you already have Conditional Access policies, Security Defaults must be disabled. You cannot run both simultaneously. Microsoft will warn you if you try to enable Security Defaults while CA policies are active.

Option 2: Per-User MFA

👤 Per-User MFA

Per-user MFA lets you enable MFA for specific accounts individually. It was the original MFA method in Microsoft 365 and is now largely superseded by Conditional Access, but remains available.

Select users, then click Enable. Users in Enabled state are prompted to register but have not done so yet. Users in Enforced state must complete MFA before accessing any app.

ℹ️
Per-user MFA has limitations
Per-user MFA does not support modern risk signals, cannot be scoped to specific apps, and cannot be combined cleanly with Conditional Access policies. Use it only if you do not have Entra P1 or as a temporary measure while setting up Conditional Access.

Option 3: Conditional Access (Recommended)

✅ Best Practice

For any tenant with Microsoft 365 Business Premium, E3, or E5, Conditional Access is the right approach. Create a policy that requires MFA for all users on all cloud apps. See the Conditional Access setup guide for the full walkthrough.

The key advantage over the other methods: Conditional Access policies can be scoped, can use risk signals, can require compliant devices, and can be put in report-only mode for testing before enforcement.

Getting Users Registered

👤 Registration

Before enforcing MFA, push a registration campaign so users are not surprised at the sign-in screen on a critical deadline day. Run a registration campaign from:

This shows a registration prompt on sign-in with a configurable snooze period (1, 3, 7 or 14 days). Set a snooze limit so users cannot defer indefinitely. Give a week's notice by email before enabling MFA enforcement so the helpdesk is not overwhelmed on day one.

Which MFA Methods to Allow

📱 Authentication Methods
📱
Authentication Methods - Recommended Settings
entra.microsoft.com › Protection › Authentication methods
Microsoft AuthenticatorPush notification or passkey. The best option for most users - approve in-app.
Enabled
FIDO2 security keysHardware keys like YubiKey. Best option for admin accounts and high-risk roles.
Enabled
Temporary Access PassTime-limited passcode for onboarding and account recovery. Enable for admins at minimum.
Enabled
SMS / Voice callWeakest option - SIM swap attacks are a real risk. Disable if your users can use Authenticator instead.
Disable where possible
Passwordless is the goal
Microsoft Authenticator supports passwordless sign-in via number matching push notifications. Once MFA is rolled out and stable, push users towards passwordless - it removes the password from the equation entirely, which is the strongest possible protection against phishing and credential stuffing.
// monthly tips

Get M365 tips in your inbox

Practical Intune and Microsoft 365 tips, once a month. No spam, no fluff.