All Posts
Microsoft 365 23 Views 5 min read

How to Setup Multi-Factor Authentication (MFA) in Microsoft 365

Last Updated March 29, 2026
How to Setup Multi-Factor Authentication (MFA) in Microsoft 365

Multi-Factor Authentication (MFA) increases security because even if one credential becomes compromised, unauthorized users will be unable to meet the second authentication requirement and will not be able to access the targeted account and therefore keeps your valuable data protected.

PREREQUISITE: the administrator must enable MFA for each user from within the admin center for individual account MFA. Conditional Access policies can enforce MFA for all users but would require additional licensing.

Setup MFA in Microsoft 365

A screenshot showing the portal.office.com sign-in page, likely displaying a custom company background and the password entry field
  • The page to enter your password will show your company’s custom background picture (if it doesn’t, please contact us to enable this additional security feature). Enter your 365 password to continue.
  • If your account is required to add additional information for MFA, you’ll see the following prompt:
A screenshot of the Microsoft 365 prompt telling the user that their organization needs more information to keep their account secure
  • Click Next and choose among the following additional methods to set up:
    • Primary
      • Microsoft Authenticator
      • Third party authenticator
    • Secondary
      • Phone
      • Email

Microsoft Authenticator

A screenshot showing the options to choose a primary setup method (Microsoft Authenticator, Third-party authenticator) or secondary methods (Phone, Email)

Microsoft 365 will prompt to set up Microsoft Authenticator by default. Microsoft Authenticator is an app that you can install from the relevant app store on your iPhone, Windows phone, or Android phone, though you can choose to use a different third-party authenticator app (Google Authenticator, Duo, Authy, etc.) if you already have a preferred one installed for OATH TOTP.

  • To set up Microsoft Authenticator, select Next and open Microsoft Authenticator on your phone (download from the store app if you haven’t yet). Click the + symbol at the top and, following the directions on the computer, select “Work or school account”, then “Scan a QR code” to use your phone to scan the QR code on the computer or “Sign in” to log into your 365 account on the phone. Either scanning the code or signing in will complete the setup. Proceeding on the computer, Microsoft will then verify with a simple push notification – select Approve on the prompt to your phone to verify.

Third-party Authenticator

  • If you choose to use a third-party authenticator instead of Microsoft Authenticator, select “I want to use a different authenticator app” on the default authenticator app page.
A screenshot showing the options to choose a primary setup method (Microsoft Authenticator, Third-party authenticator) or secondary methods (Phone, Email)
  • The look of each third-party authenticator app is a little different, but the process to add an account is generally the same. Click Next and 365 will provide a QR code – using the authenticator app on your phone, select to add a new account (usually Add Account or + symbol), and the app will request to scan the QR code.
A screenshot showing the QR code displayed on the computer screen used to link the Microsoft Authenticator app
  • If scanning the QR code doesn’t work, click the “Can’t scan image” box and you’ll see the raw code to enter into the app (will need to select similar on the phone app for it to skip the QR code and ask for the raw code directly).
A screenshot showing the push notification on a mobile device or the prompt on the PC asking the user to "Approve" the test notification
  • Once the QR code or raw code is entered into the app, the authenticator app on the phone will provide a 6-digit TOTP code – enter the code and select Next on the computer to complete the third-party authenticator setup.

Phone

  • The Phone option will ask for a phone number and request either a text or call to confirm ownership of the phone number entered.
A screenshot showing the prompt to enter a phone number and choose between "Text me a code" or "Call me"
  • Selecting text will deliver a text with a 6-digit code to the phone – just enter the code into the prompt on the computer to complete the setup. Selecting call will prompt an automated call from Microsoft to confirm (select #) or to deny (0# – if the phone number has a typo and someone else answered the call). Confirming the call will complete the setup.

Email

After setting up an authenticator app or phone, email will be available as a secondary MFA option (not available as primary, only secondary) by choosing “I want to set up a different method” at the bottom of the MFA setup prompt. Simply enter a personal email address and, similar to the text option, Microsoft will email a 6-digit code and request the code to confirm ownership of the email address. This option is also available later as an additional backup MFA option.

MFA Setup Complete

Once both required options are set up, required MFA registration is complete. To view the MFA options set up for your account or to add additional backup options, go to https://mysignins.microsoft.com/security-info. Select “Add sign-in method” at the top to add an additional MFA method.

A screenshot of the mysignins.microsoft.com/security-info portal showing the completed MFA methods and the "Add sign-in method" button
  • An alternative password-less sign-in option is available here – choosing “Microsoft Authenticator – notification” will skip the password prompt during the login prompt and directly prompt for Push – Challenge, requesting the short code from your Microsoft Authenticator app to complete. As an additional security feature, the Microsoft Authenticator app will also show a small geo-located map of the source of the sign-in attempt.

If you need assistance with setting this up or are interesting in learning about the various options to better secure your data, click here to contact us and one of our experts will be in touch shortly.

Share this article:
Fast-Track Your Compliance

Need help with Aramco CCC Certification?

Get a Free Expert Consultation.

Aramco Kit

Ali Aljubaily

Cybersecurity Consultant

I am Ali Yousef, a certified engineer from Microsoft, holding the Microsoft Certified System Associate certification as well as the CompTIA Network+ certification. I work as the Group IT Manager.

Latest

Explore Our Blog Posts

Discover insightful articles on cybersecurity and more.

Aramco CCC secure corporate contract and business ROI
Aramco Cybersecurity Compliance 34 Views 8 min read

Beyond Compliance: Long-Term ROI and Security Benefits of the Aramco CCC All-In-One Kit

Discover how the Aramco CCC All-In-One Kit protects your revenue and secures your vendor status. 100% Audit Pass Guarantee*. Secure...
Read more
Aramco CCC Certification Guide for Saudi SMEs 2026
Aramco Cybersecurity Compliance 28 Views 7 min read

Aramco CCC Certification Guide for Saudi SMEs 2026

Complete guide for Saudi SME General Managers to obtain Aramco CCC certification. Learn SACS-002 requirements, costs, timeline & how to...
Read more
NHR Alemtithal Announces Official Registration with the National Cybersecurity Authority (NCA)
Uncategorized 27 Views 2 min read

NHR Announces Official Registration with the National Cybersecurity Authority (NCA)

NHR announces its official registration with the NCA. Learn how this milestone aligns with our commitment to compliance and IT...
Read more

Our Certified Expertise and Technology Partnerships

We are certified partners with the world's leading cybersecurity vendors to deliver best-in-class solutions.

Microsoft
Microsoft
Certified Partner
Bitdefender
Bitdefender
Gold Partner
Fortinet
Fortinet
Authorized Partner
Acronis
Acronis
Certified Partner

Ready to Secure Your Business?

Our cybersecurity experts are here to help you achieve compliance and protect your digital assets. Contact us for a free, no-obligation assessment of your cybersecurity needs. We are committed to a 2-hour response time for all inquiries during business hours.

2-hour response time
Free consultation
Certified experts