How to configure an MFA-enabled service account

If your service account is MFA-enabled, you need to use either the Conditional Access or Trusted IP feature in Microsoft 365 to bypass MFA. Once you have configured one of these features, proceed to configure the service account in M365 Security Plus.

Note: To use Conditional Access or Trusted IPs, you need an Azure AD Premium P1 license.

Steps to configure Trusted IPs

  • Log in to portal.azure.com using your Global Administrator credentials.
  • Click Azure Active Directory under Azure services.
  • Choose Security from the left pane.
  • Click MFA under the Manage category in the left pane.
  • Choose the Additional cloud-based MFA settings option.
  • In the new window that opens, go to the trusted ips section.
  • Select the Skip multi-factor authentication for requests from federated users on my intranet option.
  • In the text box, enter the IP address of the machine in which you have installed M365 Security Plus.
  • Click Save.

Steps to configure Conditional Access

In this section, you will learn how to create a policy to enforce MFA and exclude M365 Security Plus users so they do not have to undergo multiple authentication.

  • Log in to portal.azure.com using your Global Administrator credentials.
  • Click Azure Active Directory under Azure services.
  • Choose Security from the left pane.
  • Click Conditional Access under the Protect category in the left pane.
  • Click New Policy.
  • Provide a name for the policy.
  • Click the Users and groups option.
  • Select the Exclude tab.
  • Select the Users and groups check box, and choose the M365 Security Plus users for whom MFA should not be enforced.
  • Click Select.
  • Under the Access controls section, click Grant.
  • Select the Grant access radio button and the Require multi-factor authentication check box.
  • Click Select.
  • Click Create and then Save.
Get download link