Skip to main content

Configuring Phishing‑Resistant MFA (PR‑MFA) in Entra ID Conditional Access

Overview

Phishing‑Resistant MFA (PR‑MFA) is the strongest authentication assurance level available in Microsoft Entra ID. It requires cryptographically bound authentication methods such as FIDO2 security keys, device‑bound passkeys, or Windows Hello for Business.

Microsoft formally introduced Phishing‑resistant MFA Authentication Strength as part of Conditional Access by 2025. This prevents attackers from bypassing MFA via techniques like real‑time phishing proxies, MFA fatigue, push spam, or OTP interception.

Use Cases

Use PR‑MFA for:

  • Administrators and privileged roles (Global Admin, Security Admin, Conditional Access Admin)
  • Users accessing high‑value or regulated workloads
  • Teams handling sensitive data: finance, HR, legal
  • Zero‑Trust access strategies requiring high authentication assurance

Prerequisites
Licensing

  • Microsoft Entra ID P1/P2 (Authentication Strengths supported).

Technical Requirements

  • Supported phishing‑resistant methods enabled (FIDO2, Windows Hello, Passkeys).
  • Users must have registered a phishing‑resistant method before enforcement to avoid lockouts

Supported Authenticators

  • FIDO2 security keys (hardware)
  • Windows Hello for Business
  • Device‑bound passkeys (Windows/macOS/iOS/Android depending on platform)

 

 

Do not enforce PR‑MFA without ensuring users have registered the required method. Risk of tenant lockout. Break‑glass (emergency access) accounts must be excluded. Legacy apps that do not support modern authentication may require exceptions or re‑architecture.

Step‑by‑Step Configuration
Step 1:  Enable Phishing‑Resistant Authentication Methods
  • Go to Entra Admin Center → Identity → Protection → Authentication Methods.
  • Enable:

Passkeys (FIDO2)
Windows Hello for Business
(Supported as documented for phishing‑resistant methods.) [office365itpros.com]

 

Step 2 — Create a Security Group for Pilot Users

Create a group like PR‑MFA‑Pilot.
Add admin users or a testing cohort.

Step 3 — Configure Authentication Strength

Go to Identity → Protection → Conditional Access → Authentication Strengths.
Select Phishing‑resistant MFA strength.

This explicitly enforces device‑bound cryptographic methods.
 [learn.microsoft.com]

 

Step 4 — Create the PR‑MFA Conditional Access Policy

Go to Conditional Access → Policies → + New Policy.
Name: Require Phishing‑Resistant MFA
Assignments:

Users: select PR‑MFA‑Pilot group
Cloud apps: All cloud apps (recommended for admins)


Access Controls → Grant → Require Authentication Strength
Select Phishing‑resistant MFA
Enable policy = Report‑only (first phase).
After validation, Switch to ON.