Skip to Content

How I Enable MFA Using Conditional Access (and Disable Security Defaults)

1 January 2026 by
Jaspreet Singh

This is the exact baseline setup I use when securing a Microsoft Entra tenant.

I’m covering only three things here:

  • Disabling Security Defaults

  • Enforcing MFA using Conditional Access

  • Verifying the setup using sign-in logs

Nothing extra. No geo-blocking. No advanced Zero Trust — just doing MFA the right way.


Before I Start (Important)

Before touching Conditional Access, I always make sure of this:

  • Entra ID P1 or P2 is available

  • I’m signed in as a Global Administrator

  • A break-glass account exists

    • Strong password

    • Excluded from Conditional Access

    • MFA not enforced

I’ve seen too many lockouts caused by skipping this step.

I never proceed without a break-glass account.


Step 1: I Disable Security Defaults

Security Defaults and Conditional Access don’t work together.

If I want control, Security Defaults has to go.

What I Do

  1. Sign in to the Microsoft Entra admin center

  2. Go to:

    Identity → Overview → Properties

  3. Click Manage security defaults

  4. Set Enable security defaults = No

  5. Click Save

Screenshot

This is one of the steps of enabling MFA via Conditional access in M365 tenants

This is one of the steps of enabling MFA via Conditional access in M365 tenants

What this shows:

Security Defaults turned off so Conditional Access can take over.


Step 2: I Create a Conditional Access Policy to Require MFA

This is where MFA should actually be enforced — not through Security Defaults.

What I Do

  1. Go to:

    Protection → Conditional Access → Policies

  2. Click + New policy

  3. Policy Details I Use
  4. Policy name - CA - Require MFA for All Users

Assignments

Users

  • Include: All users

  • Exclude:

    • Break-glass account(s)

    • Service accounts (if any)

I always double-check exclusions before moving on.

Target resources

  • Include: All cloud apps

Access Controls

Grant

  • Select Require multi-factor authentication

  • Choose Require one of the selected controls

Policy State

  • I set this to Report-only first

  • Then I click Create

I never turn a new policy on immediately.

Screenshot

This is one of the steps of enabling MFA via Conditional access in M365 tenants

This is one of the steps of enabling MFA via Conditional access in M365 tenants

This is one of the steps of enabling MFA via Conditional access in M365 tenants

What this shows:

MFA enforced using Conditional Access — the right way.

Step 3: I Verify Everything Using Sign-In Logs

Before enabling anything, I confirm how the policy behaves.

What I Check

  1. Go to:

    Monitoring → Sign-in logs

  2. Open a recent sign-in

  3. Check the Conditional Access tab

  4. I confirm:

    • MFA is required

    • Policy result shows Report-only: Success

This step catches mistakes before users are impacted.

Screenshot

This is one of the steps of enabling MFA via Conditional access in M365 tenants

This is one of the steps of enabling MFA via Conditional access in M365 tenants

This is one of the steps of enabling MFA via Conditional access in M365 tenants

What this shows:

MFA requirement being evaluated correctly.

Step 4: I Turn the Policy ON

Once I’m satisfied with the sign-in logs, I enable the policy.

What I Do

  1. Open the MFA Conditional Access policy

  2. Change Enable policy from:

    • Report-only → On

  3. Save the policy

Screenshot

This is one of the steps of enabling MFA via Conditional access in M365 tenants

This is one of the steps of enabling MFA via Conditional access in M365 tenants

This is one of the steps of enabling MFA via Conditional access in M365 tenants

What this shows:

MFA policy enabled after proper validation.

End Result

At this point:

  • Security Defaults are disabled

  • MFA is enforced using Conditional Access

  • All users are protected (except excluded accounts)

  • MFA enforcement is auditable and predictable

This is the baseline I trust before adding more advanced controls.

Mistakes I Still See (and Avoid)

  • Enabling MFA without a break-glass account

  • Turning policies on without Report-only testing

  • Forgetting service accounts

  • Relying on Security Defaults long-term

None of these are complex mistakes — but they cause real outages.

Final Thoughts

Security Defaults are fine when you’re starting out.

But if you manage tenants seriously, Conditional Access is how MFA should be enforced.

This setup isn’t fancy — it’s reliable, and that’s why I use it.

Zero Trust Isn’t a Tool — It’s a Habit I Had to Learn the Hard Way