Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Feature Request]: Entra settings available in standards - Report suspicious activity and System-preferred multifactor authentication #3609

Closed
HappyEarthDay opened this issue Feb 10, 2025 · 5 comments
Assignees
Labels
enhancement New feature or request no-priority

Comments

@HappyEarthDay
Copy link

Description of the new feature - must be an in-depth explanation of the feature you want, reasoning why, and the added benefits for MSPs as a whole.

Hi! Our MSP would love to set the following two settings across all organizations.

Report suspicious activity and System-preferred multifactor authentication
Image

We'd love to be able to set either of these settings to Enable or Disabled for All Users across all tenant

Thank you!

PowerShell commands you would normally use to achieve above request

https://learn.microsoft.com/en-us/graph/api/resources/authenticationmethodspolicy?view=graph-rest-beta

reportSuspiciousActivitySettings and systemCredentialPreferences

@HappyEarthDay HappyEarthDay added enhancement New feature or request no-priority labels Feb 10, 2025
@kris6673
Copy link
Contributor

I would like to work on this please!

Copy link

Great! I assigned you (@kris6673) to the issue. Have fun working on it!

Copy link

Sorry, can't help you here. This issue already has a volunteer.

1 similar comment
Copy link

Sorry, can't help you here. This issue already has a volunteer.

@kris6673
Copy link
Contributor

And there ya go, glad to see you're back with FR's again @HappyEarthDay!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request no-priority
Projects
None yet
Development

No branches or pull requests

3 participants