Skip to content
The Lazy Administrator
  • Home
  • Disclaimer
  • Contact
  • About Me
  • Search Icon

The Lazy Administrator

Finding ways to do the most work with the least effort possible

Improve your Azure Multi-Factor Authentication Notifications

Improve your Azure Multi-Factor Authentication Notifications

September 26, 2022 Brad Wyatt Comments 2 comments

Table of Contents

  • Configure Fraud Alerts
  • Require number matching for push notifications
  • Show application name in push and passwordless notifications
  • Show geographic location in push and passwordless notifications
  • Enabling all the Policies

Recently, Uber appeared to be hacked in what is called a MFA Fatigue attack. The attacker continuously sent MFA requests to an end user hoping they would accidentally approve one of them. Microsoft has several items to help prevent MFA fatigue attacks that you can configure and enable for your end users. Traditionally, MFA notifications are push notifications where a user can either accept or deny the request. Some improvements to this have been multiple number options where the end user must select one of four numbers that is presented on the screen they are logging into. The problem with this is that leaves a 1 in 4 chance an accidental selection may result in unauthorized access.

Configure Fraud Alerts

Fraud Alerts allow your users to report fraud if they receive a two-step verification request that they didn’t initiate and automatically block their account from sign-on.

Go to the Azure Portal and launch Azure Active Directory > Security > Multi-Factor Authentication > Fraud Alert. Here you can enable Fraud Alerts, and configure if users will automatically be blocked from signing in if they submit an alert. If a user is blocked, you can unlock them in the Block/unblock users.

When end-users submit fraud alerts, they will be notified about the account lockout.

Require number matching for push notifications

If you enable “Require number matching for push notifications” the user will have to type in the number they see on screen. This is an improvement compared to the legacy number selection option because during a MFA fatigue attack, the probability of typing in the correct number is incredibly slim.

To configure this option, go to Azure Portal > Azure Active Directory > Security > Authentication Methods > click on Microsoft Authenticator > and click on the configure tab. Make sure your user or users are targeted in the Basics tab as well.

The notification on the mobile device will look like the screenshot below.

Show application name in push and passwordless notifications

Showing the application name can help users understand where the request is coming from. If a user is signing into Outlook the same time an attacker is trying to modify their security settings, they may get the attackers MFA request first, and thinking its them signing into Outlook, accept it. Afterwards they may get the second, legitimate MFA request and think that it was a fluke accident or just think nothing of it. Meanwhile the attacker has gained access to their account.

To configure this option, go to Azure Portal > Azure Active Directory > Security > Authentication Methods > click on Microsoft Authenticator > and click on the configure tab. Make sure your user or users are targeted in the Basics tab as well.

The notification on the mobile device will look like the screenshot below.

Show geographic location in push and passwordless notifications

The last option is to include geographic location within the push notification. Keep in mind if users are using VPN’s, Remote Desktop, or AVD, they may be confused as the location could appear from the endpoint and not from where they are physically.

To configure this option, go to Azure Portal > Azure Active Directory > Security > Authentication Methods > click on Microsoft Authenticator > and click on the configure tab. Make sure your user or users are targeted in the Basics tab as well.

The notification on the mobile device will look like the screenshot below.

 

Enabling all the Policies

Lastly, you may want to enable all the policies that are available. The screenshot below shows what that will look like for the end user.

Brad Wyatt
Brad Wyatt

My name is Bradley Wyatt; I am a 5x Microsoft Most Valuable Professional (MVP) in Microsoft Azure and Microsoft 365. I have given talks at many different conferences, user groups, and companies throughout the United States, ranging from PowerShell to DevOps Security best practices, and I am the 2022 North American Outstanding Contribution to the Microsoft Community winner.


Azure, Security
Active Directory, Azure, Azure Active Directory, MFA, Multi-Factor Authentication, Security

Post navigation

PREVIOUS
Block Outdated Operating Systems with Microsoft Defender for Cloud Apps (Cloud App Security)
NEXT
Set Google as Default Search Engine for Microsoft Edge using Intune

2 thoughts on “Improve your Azure Multi-Factor Authentication Notifications”

  1. RJ says:
    September 19, 2024 at 7:54 am

    Brad,

    This is great info, thank you.

    Do you know to setup an alert when an MFA method is added, changed or deleted in Microsoft account setting security option?

    Reply
    1. M.Mahoney says:
      October 3, 2024 at 9:28 am

      I also would like to know.

      Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Subscribe

Email


Categories

  • Active Directory (8)
  • AI (3)
  • API (1)
  • AutoPilot (2)
  • Azure (15)
  • Bicep (4)
  • Connectwise (1)
  • Defender for Cloud Apps (1)
  • Delegated Admin (1)
  • DevOps (6)
  • Graph (6)
  • Intune (15)
  • LabTech (1)
  • Microsoft Teams (6)
  • Office 365 (19)
  • Permissions (2)
  • PowerShell (50)
  • Security (1)
  • SharePoint (3)
  • Skype for Business (1)
  • Terraform (1)
  • Uncategorized (2)
  • Yammer (1)

Recent Comments

  • Kristopher Gates on Getting Started with GitHub Copilot in the CLI
  • MD SHARIQUE AKHTAR on Modern Active Directory – An update to PSHTML-AD-Report
  • TommyBoich on How The ConnectWise Manage API Handles Pagination with PowerShell
  • LOTTERY 365 LOGIN on Windows LAPS Management, Configuration and Troubleshooting Using Microsoft Intune
  • SPRUNKI PHASE 6 on Get a New Computer’s Auto Pilot Hash Without Going Through the Out of Box Experience (OOBE)

1,739,765 People Reached

© 2025   All Rights Reserved.