Categories

Disabling MFA is essential for running CoreView properly with service accounts. However, to ensure the security of your tenant, it's crucial to use Conditional Access to block connections outside of our data center.

Requirement: You should have an Office 365 E1 license (or above). It is not necessary to have an Azure AD Premium P1 (or above) license.



Step 1

Login to Admin Office 365 portal (https://admin.microsoft.comhttps://admin.microsoft.com) 



Step 2

In the navigation menu navigate to Users > Active Users

Graphical user interface 
Description automatically generated with low confidence




Step 3

Click on any active user. The user properties tab will appear on the right of your screen. Scroll down and click on Manage multifactor authentication.

Graphical user interface, text, application, email 
Description automatically generated 



Step 4

Disable MFA for the CoreView Service Accounts.  You should disable the Multifactor Authentication for the CoreView service users. To do that, click on the magnifying glass to open the search field.


Graphical user interface, text, application, email 
Description automatically generated


Search for and select all service users and click on “Enable” in the property menu.  

Note: The number of service users depends on the size of your tenant. The rules for the names are:  

  • cvroa<randomicnumber>@<onmicrosoft domain> 
  • coreview.reports<randomicnumber>@<onmicrosoft domain>  
  • 4ward365.admin@<onmicrosoft domain>  

If they already have the “Disabled” status, then you do not need to make any changes. 


Graphical user interface, application 
Description automatically generated


If the status is set to "Enabled", then select the users that need to be disabled and click the "Disable" option on the right side of the screen. 


Graphical user interface, text, application, email 
Description automatically generated


Another window will open, confirming your choice. Click "yes" to disable multi-factor authentication. 


Graphical user interface, application 
Description automatically generated


Close the confirmation window.


Graphical user interface, text, application, email 
Description automatically generated


Now that MFA has been disabled for service accounts, it is crucial to ensure the security of your tenant by proceeding to the next step of the process. Please use Conditional Access to block connections from outside our data center.


Important note about Multi-Factor Authentication


If you have implemented Multi-Factor Authentication (MFA) for accessing your Microsoft 365 cloud services, please create a conditional access policy that prevents your on-premises hybrid agent IP address from asking for any second-factor authentication for the CoreView service account named “4ward365.admin@yourdomain.onmicrosoft.com”. 


Without this exception policy, your CoreView tenant won't be able to open any management session. 


Please be aware that your hybrid agent IP address may be behind a NAT applied by your network gateway for connecting to public networks such as the Internet. We recommend checking with your network specialist to identify your public IP address used by your on-premises for connecting to the public networks. 


For more information about conditional access exception policy, please refer to the Official Microsoft documentation: https://docs.microsoft.com/en-us/azure/active-directory/governance/conditional-access-exclusion