Operations

Set Up MFA on Microsoft 365

Step-by-step Microsoft 365 MFA setup: Entra security defaults, Authenticator app, protect admins, and block legacy authentication for SMEs.

May 2026 · 8 min read · Published by the M365 Deals Editorial Team

Set Up MFA on Microsoft 365

At a glance

  • Turn on multi-factor authentication (MFA) for every user — especially admins.
  • Use the Microsoft Authenticator app instead of SMS when possible.
  • Block legacy sign-in so passwords alone cannot bypass MFA.
  • Takes about 10–15 minutes for a small tenant if you follow the steps below.

Who this guide is for

Office managers or IT contacts who administer Microsoft 365 for 5–100 users in Thailand or Singapore. You need Global Administrator or Authentication Administrator rights.

Why MFA matters

Most business email compromises start with a stolen password (phishing or reused passwords). MFA stops most automated attacks because the attacker also needs your phone or security key.

Microsoft and insurers increasingly expect MFA for any company handling customer or payroll data.

Step 1 — Open Entra security defaults or Conditional Access

  1. Sign in to Microsoft Entra admin center.
  2. Go to Protection → Security defaults (simplest for small tenants).

If Security defaults are available:

  • Set Security defaults to Enabled (forces MFA registration for all users).

If you already use Conditional Access (Business Premium / E3+):

  • Create a policy: All users → All cloud apps → Require authentication strength (MFA).

Step 2 — Ask users to register MFA

Each person registers once:

  1. Go to https://aka.ms/mfasetup while signed in.
  2. Add Microsoft Authenticator (recommended) or a phone number.
  3. Approve the test prompt on the phone.

Tip for staff: Show them one screenshot walkthrough in a short Teams meeting — adoption is faster than email alone.

Step 3 — Protect admin accounts

  • Create dedicated admin accounts (not daily email).
  • Require MFA on every admin.
  • Avoid sharing one Global Admin password in a chat group.

Step 4 — Block legacy authentication

Legacy protocols (old POP/IMAP clients) can skip MFA.

  1. Entra → Protection → Conditional Access
  2. Policy: block Legacy authentication clients

(Requires Entra ID P1 — included in Business Premium and Enterprise E3.)

If you are on Business Standard only, disable POP/IMAP in individual mailboxes and move users to modern Outlook.

Common problems

SymptomFix
User locked outAdmin resets MFA methods in Entra → Users → Authentication methods
Authenticator not promptingCheck phone time sync; reinstall app
Scanner/app breaksUse app password or move app to modern auth — ask your partner
Too many SMS costsSwitch users to Authenticator app

Plans and MFA features

PlanMFA registrationConditional Access
Business BasicYesLimited
Business StandardYesLimited
Business PremiumYesFull (Intune + CA)
Enterprise E3/E5YesFull

See security checklist for SMEs.

Summary

Enable MFA tenant-wide, register Authenticator for each user, harden admin accounts, and block legacy sign-in where your license allows. This is the highest-return security step after buying the right license.

Next steps

Ready to make the switch?

If you've decided Microsoft 365 is the right fit — or you're still weighing options — we'll help you pick the right plan for your team.