Bison Infosolutions Knowledgebase
Protect your Lenovo Server

How to Enable Two-Factor Authentication (2FA) for Admin Accounts in Microsoft 365 Business Basic

Admin accounts in Microsoft 365 have the highest level of access and are the primary target for phishing and credential-theft attacks. To protect these privileged accounts, Microsoft strongly recommends enabling Two-Factor Authentication (2FA), also known as Multi-Factor Authentication (MFA).

This article explains, step by step, how to add and enforce 2FA for Admin users in Microsoft 365 Business Basic using the modern and secure method via Conditional Access.


What is 2FA / MFA for Admin Accounts?

2FA adds an extra layer of security beyond just a password. After entering the password, the admin must verify their identity using:

  • A mobile OTP (SMS or call), or

  • Approval from the Microsoft Authenticator app

Even if a password is compromised, attackers cannot access the account without the second factor.


Why 2FA is Mandatory for Admins

  • Prevents unauthorized access

  • Protects against phishing attacks

  • Required for Microsoft security compliance

  • Reduces risk of tenant takeover

  • Recommended by Microsoft Security Baseline


Prerequisites

Before starting, ensure:

  • You are signed in as a Global Administrator

  • Microsoft 365 Business Basic license is active

  • Admin user has access to a mobile phone

  • Internet access to Microsoft 365 Admin Center


Step 1: Sign in to Microsoft 365 Admin Center

  1. Open browser and go to
    https://admin.microsoft.com

  2. Sign in using your Admin credentials


Step 2: Open Microsoft Entra Admin Center

  1. In the left menu, click Show all

  2. Select Identity

  3. You will be redirected to Microsoft Entra Admin Center

Microsoft Entra is the new name for Azure Active Directory.


Step 3: Locate the Admin User

  1. Go to Users β†’ All users

  2. Select the Admin account

  3. Confirm the role is:

    • Global Administrator / Security Administrator


Step 4: Add Mobile Number for Admin 2FA

  1. Open Authentication methods

  2. Click + Add authentication method

  3. Select Phone

  4. Choose Authentication phone

  5. Enter:

    • Country code (example: +91)

    • Mobile number

  6. Click Save

This enables OTP via SMS or voice call.


Step 5: Add Microsoft Authenticator App (Recommended)

  1. Under Authentication methods

  2. Click + Add authentication method

  3. Select Microsoft Authenticator

  4. On next sign-in:

    • Install Microsoft Authenticator app

    • Scan QR code

    • Approve login notifications

? Authenticator App is more secure than SMS and strongly recommended.


Step 6: Enforce 2FA Using Conditional Access (Best Practice)

Instead of legacy per-user MFA, use Conditional Access.

Create Conditional Access Policy

  1. In Microsoft Entra β†’ Go to Protection β†’ Conditional Access

  2. Click Create new policy

Policy Configuration

  • Policy Name: Require MFA for Admin Accounts

  • Users:

    • Include β†’ Directory roles

    • Select β†’ Global Administrator, Security Administrator

  • Cloud Apps: All cloud apps

  • Grant Controls:

    • βœ” Require multi-factor authentication

  • Enable Policy: ON

Click Create


Step 7: Test Admin Login

  1. Sign out from admin account

  2. Sign in again

  3. You will be prompted for:

    • OTP on mobile OR

    • Authenticator app approval


Emergency Safety Recommendations

Before enforcing MFA on all admins:

  • Create at least two Global Admin accounts

  • Register backup phone numbers

  • Ensure at least one admin is fully configured with MFA

This prevents accidental admin lockout.


Common Issues and Solutions

Admin not asked for 2FA

  • Conditional Access policy not enabled

  • Admin role not selected correctly

OTP not received

  • Check country code

  • Use Authenticator app instead

Locked out of admin account

  • Use secondary Global Admin

  • Contact Microsoft Support if no backup admin exists


Best Practices for Admin Security

  • Always enable MFA for admins

  • Prefer Authenticator app over SMS

  • Avoid legacy per-user MFA

  • Review admin sign-in logs regularly

  • Use Conditional Access policies


Conclusion

Enabling 2FA for Admin accounts in Microsoft 365 Business Basic is critical for tenant security. By combining Authentication Methods and Conditional Access, you can ensure strong protection against unauthorized access, phishing, and account compromise.


#Microsoft365 #AdminSecurity #MFA #2FA #MicrosoftEntra #AzureAD #ConditionalAccess #MicrosoftAuthenticator #AdminAccount #CyberSecurity #CloudSecurity #ITAdmin #BusinessBasic #MicrosoftSecurity #TenantSecurity #IdentityProtection #AdminLogin #MFASetup #AdminProtection #ZeroTrust #PhishingProtection #CloudAdmin #SecureLogin #Microsoft365Admin #IdentityManagement #AccessControl #ITSecurity #AdminMFA #MicrosoftCloud #SecurityBestPractices #AdminAccess #OTP #AuthenticatorApp #AdminPolicy #SecurityCompliance #AdminSafety #MicrosoftTenant #AdminHardening #SecureAdmin #IdentitySecurity


Microsoft 365 admin 2FA enable MFA admin Microsoft 365 Microsoft 365 Business Basic security admin account MFA Microsoft Entra MFA Azure AD admin MFA Microsoft 365 admin security enforce MFA admins conditional access MFA Microsoft Authenticator a
Sponsored