AD1.1 Why Identity Is the Perimeter
Figure AD1.1 — The perimeter shift from network to identity. In the old model, the firewall was the trust boundary. In the new model, authentication is the trust boundary. Every layer you add to the identity perimeter — MFA, conditional access, device compliance, risk detection — increases the cost and difficulty for the attacker.
The numbers that settle the argument
Microsoft processes over 300 billion authentication requests per month across Entra ID. They have more data on identity attacks than any other organisation on Earth. Their data shows that accounts without MFA are compromised at a rate 99.9% higher than accounts with MFA enabled. That’s not a rounding error. It means that for every 1,000 accounts that get compromised without MFA, only 1 gets compromised with MFA enabled.
The 0.1% that still get through with MFA are not random — they’re sophisticated attacks like adversary-in-the-middle (AiTM) proxy phishing, SIM swapping, and MFA fatigue bombing. These attacks require significantly more effort, tooling, and targeting than a simple password spray. Most attackers hitting most organisations are running commodity attacks — automated password spraying, credential stuffing from breach databases, and basic phishing. MFA stops all of these cold.
This is why identity is the first module you configure, and MFA is the first control you deploy. No other single security control in the M365 stack has a comparable impact. Safe Links reduces phishing click-through rates. Device compliance ensures endpoints meet baselines. DLP prevents data leakage. All important. None of them approaches the 99.9% reduction in account compromise that MFA provides.
How credential attacks work in practice
An attacker who wants access to your M365 tenant has four primary techniques, and understanding each one tells you exactly what MFA does and doesn’t protect against.
Password spraying is the most common automated attack. The attacker takes a list of common passwords (Password1!, Spring2026!, Company123!) and tries each one against every username in your tenant. They try one password per account per hour to stay under lockout thresholds. With 210 users and 10% using weak passwords, the attacker gets 21 valid credentials. Without MFA, each of those is full access to the account. With MFA, each of those is a failed authentication — the attacker has the password but can’t complete the second factor.
Credential stuffing uses username/password pairs from other breaches. When LinkedIn, Dropbox, or any other service gets breached, the stolen credentials end up on dark web markets. If your users reuse passwords (and statistically, 60-65% do), the attacker tries the breached credentials against your M365 login. Same result: without MFA, immediate access. With MFA, blocked.
Basic phishing sends an email with a link to a fake Microsoft login page. The user enters their credentials on the fake page. The attacker now has the username and password. Without MFA, immediate access. With MFA, the attacker has the password but can’t complete the second factor — unless they’re running an AiTM proxy (covered in AD1.2).
MFA fatigue targets accounts that already have MFA enabled. The attacker has the password (from spraying, stuffing, or phishing) and triggers MFA push notifications repeatedly until the user approves one out of frustration or confusion. This attack works against push-based MFA methods and is why Microsoft now enables number matching by default — the user must type a number shown on the login screen into their phone, rather than just tapping “Approve.”
The practical lesson: MFA stops the first three attack types completely. The fourth requires the attacker to already have the password AND to social-engineer the user into approving a push. Each additional defence layer raises the cost and complexity for the attacker.
What happens in your tenant without MFA
Walk through a concrete scenario using NE’s environment. NE has security defaults enabled, which means MFA is partially enforced — Microsoft’s risk engine decides when to challenge. Thirteen percent of users haven’t registered for MFA.
An attacker runs a password spray against NE’s tenant using a list of the 200 most common passwords. They find 15 accounts with weak passwords. For the 13 accounts that have MFA registered, Microsoft’s risk engine might challenge some of them — but “might” is not “will.” Security defaults use probabilistic MFA, not deterministic. The attacker tries from a clean residential IP address, rotates user-agents, and spaces attempts across hours. Some of these sign-ins may not trigger an MFA challenge.
For the 2 accounts in the 13% that haven’t registered for MFA, the attacker gets immediate access. They can’t be challenged for MFA because they haven’t registered an MFA method. These accounts are fully compromised with just the password.
Now walk through the same scenario with conditional access enforcing MFA for all users. Every sign-in, regardless of risk assessment, requires MFA. The 15 accounts with weak passwords get challenged on every attempt. The attacker can’t authenticate without completing the second factor. The 2 unregistered accounts are blocked entirely — conditional access can be configured to block accounts that haven’t registered for MFA rather than letting them through with password-only authentication.
That’s the difference between security defaults and conditional access. Not theoretical. Not marginal. The difference between “some attacks might be blocked” and “all password-only attacks are blocked, deterministically, every time.”
Detecting active password sprays in your tenant right now
You can check whether your tenant is being targeted by a password spray attack right now. Navigate to entra.microsoft.com → Monitoring → Sign-in logs. Add a filter for “Status: Failure” and set the time range to “Last 7 days.” Now look at the IP address column.
If you see a single IP address appearing repeatedly against multiple different user accounts — the same IP trying one password against dozens of accounts over several hours — that’s a password spray in progress. The attacker is testing common passwords (Password1!, Spring2026!, Welcome123!) one at a time across your entire user list, staying under lockout thresholds by trying one password per account per hour.
With MFA enforced, every one of these spray attempts fails even when the password is correct. The attacker enters the right password, gets prompted for MFA, can’t complete it, and the sign-in fails. This is MFA working exactly as designed. But the spray tells you two things: your tenant is being actively targeted (which means your MFA enforcement is not optional — it’s preventing real attacks right now), and some of your users have weak passwords (the spray wouldn’t be worth running if common passwords never worked).
To quantify the spray, run this in PowerShell:
| |
Error code 50126 is “Invalid username or password.” IPs with more than 10 failed attempts against your tenant in a week are likely automated attacks. If you see IPs with 50, 100, or 200+ attempts, you’re looking at a sustained spray campaign. The good news: MFA is stopping it. The action item: check whether any accounts in the spray targets have weak passwords and haven’t registered for MFA — those are the accounts at risk.
The cost of getting this wrong
To make this concrete: the average cost of a business email compromise incident is $125,000 to $500,000 in direct financial loss, plus investigation costs, legal fees, and regulatory notification costs if personal data was exposed. The average cost of deploying MFA to 200 users is zero dollars (Microsoft Authenticator is free, conditional access is included in E3) and approximately 8 hours of IT administrator time for configuration and user communication.
The return on investment is absurd. Eight hours of work eliminates 99.9% of credential-based attacks. No other security investment in your entire career will deliver a comparable ratio of effort to impact. This is why identity is the first module, MFA is the first control, and conditional access is the first configuration. Everything else in this course matters. This matters most.
Your IT manager says: “We should deploy MFA to the executive team first since they have access to the most sensitive data, then roll it out to everyone else over the next quarter.” This sounds reasonable. Is it the right approach?
Option A: Yes — protect the highest-value accounts first, then expand.
Option B: No — deploy MFA to all users simultaneously via conditional access.
Option C: Deploy to IT and security staff first as a pilot, then executives, then everyone else.
The correct answer is Option B. Conditional access policies apply to groups, and the easiest, safest deployment targets “All users” with exclusions only for break-glass accounts. A phased rollout by department creates a window where non-executive accounts are unprotected — and attackers don’t care about org charts. The finance clerk who processes payments is a higher-value BEC target than many executives. The helpdesk technician who can reset passwords is a privilege escalation target. Every unprotected account is a potential entry point. Deploy to everyone at once, with break-glass accounts excluded, and handle exceptions individually rather than by department.
Try it: Check your MFA registration coverage
Navigate to entra.microsoft.com → Protection → Authentication methods → Activity. Click the “Registration” tab. This report shows the total number of users capable of MFA, the number registered, and the registration rate as a percentage.
Click “Users capable of MFA” to see which users have NOT registered. For each unregistered user, determine why: Is it a shared account? A service account? A user who hasn’t signed in recently? An account that should have been disabled? Each unregistered account is a potential entry point for a password-only attack.
If your registration rate is below 95%, you have a gap. Module AD1.3 walks through how to close it — including re-registration campaigns, grace periods, and alternative MFA methods for users without smartphones.
Now navigate to Protection → Authentication methods → Activity → Usage. This shows which MFA methods your users are actually using. If the majority are using “Phone call” or “SMS,” you have a weaker MFA deployment than if they’re using “Microsoft Authenticator” or “FIDO2 security key.” Phone-based methods are vulnerable to SIM swapping. Push notifications with number matching are the recommended baseline.
You're reading the free modules of M365 Security: From Admin to Defender
The full course continues with advanced topics, production detection rules, worked investigation scenarios, and deployable artifacts. Premium subscribers get access to all courses.