back to article Microsoft likens MFA to 1960s seatbelts, buckles admins in yet keeps eject button

Microsoft is introducing three Conditional Access policies for sysadmins as it continues to promote the implementation of multi-factor authentication (MFA) in organizations. The trio of optional policies will be automatically deployed to eligible customers' tenants in a report-only mode at first. Customers will have a 90-day …

  1. Anonymous Coward
    Anonymous Coward

    After we forced MFA for all users, the number of hacked accounts. dropped by over 99%. (It wasn't quite 100% as we've had one hacked account due to social engineering)

    1. karlkarl Silver badge

      Is it because no-one can be bothered to log in anymore? Even legit users?

      This has become the case here.

  2. Scott 26

    I wish I could turn on MFA across the entire enterprise.... but OpSec still has this pre-cloud mentality that if the users are on-prem (physically or logically, via a VPN) then they don't need to do MFA..... I have strongly lodged my objections, and am now waiting for the first breach due to a compromised on-prem device.

    Also the belief "we don't want to disrupt the C-suite" - ffs, who do you think is a richer target? The CxO or John at the callcentre?

  3. Anonymous Coward
    Anonymous Coward

    Er MFA is merely one part of Conditional Access

    or it was when I was an Azure sysadmin.

    You have the conditional access framework which in turn triggers one of the methods of MFA (SMS, email, authenticator, etc).

    You turn *on* conditional access, then configure it to use MFA when a condition is tripped.

    1. 43300 Silver badge

      Re: Er MFA is merely one part of Conditional Access

      They are currently trying to phase out SMS - which wouldn't be such as issue if the authenticator app was less of a pain in the arse to set up for users who aren't very IT literate. And the user has to do it (unlike with SMS where the admins can set it up for them).

      1. JimmyPage

        Re: authenticator app

        you don't actually need the MS one - they all use the same TOTP. Quite a few password managers now handle the 2FA as well. Not quite sure if that helps security, but it was bound to happen.

        1. loops

          Re: authenticator app

          Not any more, not by default. Microsoft made their own Authenticator app the only way to Authenticate through the newish (15th September) "Registration Campaign" in Authentcation Methods in AAD/Entra/whatever they call it this week, even for TOTP, certainly for any newly registered accounts.

          The generated QR code only works with the Microsoft app and it registers the app to the corresponding user account. You could see this for a few weeks after implementation, because you could see where people were authenticating from in Sentinel (yes - Sentinel was actually tracking personal devices!! since fixed), even when using TOTP, not push!

          Interestingly, Microsoft have prevented you scanning the same QR code twice when one account registers through the "campaign" (so multiple people can no longer have the same TOTP code on their devices). More secure, but I bet we're not the only ones who have a real world use for this feature (we have a couple of generic shared accounts, so we want to have the same TOTP on multiple devices).

          You can, of course, bypass all this by disabling the registration campaign - at which point the "use other autenticator" link appears again, and the QR codes are just generic TOTP codes rather than Microsoft specific codes.

          The reason they're doing this is because they're pushing "Microsoft Managed MFA" and they can't enforce much if they don't control the app that people are authenticating with (+ they almost certainly upload a bunch of "telemetry" from every device the app is installed on, and then sell it - that's the age we live in).

      2. Cliffwilliams44 Silver badge

        Re: Er MFA is merely one part of Conditional Access

        Good lord.

        It's not that hard. We deployed MFA across our company and had little problems. Being a construction company it's not like our people are the most tech savvy.

  4. Roland6 Silver badge

    1960s seat belts…

    Whilst an improvement o what went before, it took a couple of decades before they became the more user friendly versions we use today.

    So it would seem MS are aware there are usability issues with he current implementation of MFA and expect matters to improve.

  5. Eecahmap

    Is it MFA if it's not Microsoft?

    I wish that Microsoft didn't consider _their_ MFA to be the only MFA.

    Where I work, when they say "MFA", they mean Microsoft's offering. Any other MFA is (insultingly) called 2FA or less, no matter what it actually offers.

  6. Anonymous Coward
    Anonymous Coward

    So MICROS~1 has eyes into my private computer network /s

    Who Are the Five Eyes?

    1. Palebushman

      Re: So MICROS~1 has eyes into my private computer network /s

      The 'Five Eyes' were the original members of what is now considered the 'Nine Eyes' partnership. If what is going on or around our planet is important, it's a safe bet these folk will know about it.

      1. Anonymous Coward
        Anonymous Coward

        Re: So MICROS~1 has eyes into my private computer network /s

        Palebushman: “The 'Five Eyes' were the original members of what is now considered the 'Nine Eyes' partnership. If what is going on or around our planet is important, it's a safe bet these folk will know about it.

        Do the 'Nine Eyes' know about me not cleaning up after my dog poops or am guilty of a "bin crime"?

        1. Strahd Ivarius Silver badge

          Re: So MICROS~1 has eyes into my private computer network /s

          The video is here

  7. greenwood-IT

    Please think of the techies

    Everyone agrees that MFA is great for security.

    However, spare a thought for the tech who often ends up with a buggered PC and needs to access the users system. Either the device is taken to a remote workshop or it's accessed remotely - but how do you then enter your clients fingerprint or text received on their phone? It may be more secure, but IT Support will suffer.

    1. Lee D Silver badge

      Re: Please think of the techies

      This doesn't affect any corporate user, because you're not actually storing data on those systems anyway (so the user can be given any other machine in the meantime) and you have full access to the machine.

      Remoting into a broken computer where you can't log into it as yourself is definitely a "return to base" issue nowadays.

      The whole point of MFA is that you can't pretend to be the user without their cooperation. The whole point of a corporate managed system is that IT don't need to.

      1. 43300 Silver badge

        Re: Please think of the techies

        "The whole point of a corporate managed system is that IT don't need to."

        Yeah, fine in theory - but not always in practice, given the tendency of users everywhere to do what they are not supposed to do (e.g. saving where they shouldn't), and of Microsoft things to often not work as expected (e.g. Sharepoint sync failing)

      2. Anonymous Coward
        Anonymous Coward

        Re: Please think of the techies

        The MFA system we use would allow 2 alternatives for this problem:

        * Add an additional device (such as techies phone) to an account

        * Issue a temporary bypass code

    2. Cliffwilliams44 Silver badge

      Re: Please think of the techies

      This does not affect on prem Active Directory. You can still log into the computer. This is for Microsoft 365 cloud apps and is only being forced on admin accounts.

      Now, if you have shared admin accounts, STOPTHAT!

    3. Strahd Ivarius Silver badge
      Coat

      Re: Please think of the techies

      for fingerprint, it is easy, they just need to send a finder alongside the computer...

  8. Andy The Hat Silver badge

    Here's an ad served to your personal device ...

    How much does MS earn from the personal data it sees/tracks when its MFA app is installed on *most* user's personal phones, just because Office 365 says it has to be? Up until the App install point, users are corporate numbers and (relatively) commercially unexploitable. The App is a claw into personal data.

    Cynical, and tin-foil hat firmly on perhaps but I don't trust MS as far as I can throw them.

    1. Anonymous Coward
      Anonymous Coward

      Re: Here's an ad served to your personal device ...

      I'm currently debating this with our IT dept. Their own longstanding policy says that I am not allowed to use personal devices for company business. Last week's policy is that I have to install Microsoft Authenticator on my personal phone in order to log in.

      1. Cliffwilliams44 Silver badge

        Re: Here's an ad served to your personal device ...

        Simple answer! They give you a company issued device.

        We have a similar policy, we support BYOD, but that BYOD must be controlled to a certain extent by us. You will have MFA, you will use the Outlook app, and you will have our content filtering app installed.

        When you leave the company, you will have all company data wiped. Not your personal data.

        If they don't agree to this, they can get a company issued phone that won't be as up to date as they may want.

        1. 43300 Silver badge

          Re: Here's an ad served to your personal device ...

          We do similar, but it's a fair amound of hassle - especially the tendency of users to be running some ancient device with an out of support version of Android, then comoplainig that it doesn't work.

          BYOD is one of those things which is getting to be more hassle than it's worth (and it always was a lot of hassle) - we only use it for phones now; used to allow own computers for RDP over VPN into terminal servers, but not any more.

    2. Anonymous Coward
      Anonymous Coward

      Re: Here's an ad served to your personal device ...

      Bingo, hammer meets naill

      It’s most likely a maneuvering exercise for them

    3. Anonymous Coward
      Anonymous Coward

      Re: Here's an ad served to your personal device ...

      You can use a different authenticator as long as it supports TOTP.

  9. Anonymous Coward
    Anonymous Coward

    As a user it just means more and more authenticator apps I have to waste my time dealing with and more and more "requirement to carry a bulky smartphone".

  10. Monochrome

    Bring back Apple Watch support!

    With Microsoft Authenticator, it used to be you'd get a tap on your wrist, and with an already authenticated Apple Watch (for Apple Pay, etc.), one could simply tap "confirm". No idea why they took it away. I prefer to work with my phone in a drawer, or at least out of sight. It was so convenient, user-centric, and well designed that I guess Microsoft just couldn't keep it.

    1. FirstTangoInParis Silver badge

      Re: Bring back Apple Watch support!

      Anyone wearing my Apple Watch and who knows its passcode could log in to my Mac, unless it decides to only ask for password. That’s reasonable ergonomics.

      Having to enter a 2FA code for a desktop login every time you go for coffee could be a pain, especially if your phone goes flat. Smart cards would be better if you need that much security.

      But 2FA for admin access or for sensitive information access? Sounds reasonable, so long as it works, Microsoft dudes.

  11. Anonymous Coward
    Anonymous Coward

    Conditional Access

    Conditional Access preferred by MS as it requires a higher license.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like