No Strong MFA Configured

Detects accounts with weak forms of MFA configured, such as SMS or Email. For Okta OIE environments, users with weak factors that are solely defined as recovery methods are excluded from this check.

The National Institute of Standards and Technology (NIST) recommends using one-time password solutions or cryptographical solutions such as Google Authenticator, Okta Verify, or Microsoft Authenticator as the second factor of authentication.

Recommended Actions

Encourage users to use stronger authentication on a more regular basis. If that is not possible, we recommend tagging users with administrative privileges in critical services like Okta and Workday, and providing them with physical authentication solutions like Yubikey.

Compatibility

Microsoft Entra ID

Okta

Duo

Last updated