paul78 wrote: » Your concern about setting up a trusted network and disabling MFA is unfounded, you don't have to disable MFA. We don't. It's a feature that is offered by O365 and GSuite to restrict access as an additional feature. As for using MFA for Windows logins - that depends largely on your risk tolerance. I assume that you realize that implementing MFA on endpoints makes sense only after you already enforce hard-disk encryption on your endpoints. Personally, I use a Yubikey for MFA onto my Windows laptop.
mnashe wrote: » What's the benefit of Okta over Ping?
mnashe wrote: » Not sure I follow. I'm not saying disable? My team member is recommending the Microsoft solution because there is an option to add a trusted IP, and then when users are in the office, they won't get prompted for MFA. I guess I was asking what everyone thinks of this? I understand the convenience, but to me, it takes away from the security, as internal attacker can easily login as me if they get my password. Is it common to set it up this way?
mnashe wrote: » Also, the one thing I don't like about Microsoft MFA is that there is no way to disable SMS as a backup method. While SMS MFA is better than nothing, from what I've read it's not recommended to use. I'm no security pro, so I can be wrong.
mnashe wrote: » At my company, nobody is allowed to save files locally. However, we use have VPN software set to login before windows. If a laptop is stolen and the password is found, without MFA, the person would have access to our network. In my environment, I don't think MFA for endpoints is truly needed, but I was curious what others do