mirror of
https://github.com/KelvinTegelaar/CIPP.git
synced 2026-04-25 00:06:06 +03:00
[GH-ISSUE #5448] [Feature Request]: Admin MFA alert to include users that have no tick in PU, SD or CA #2624
Labels
No labels
API
Feature
NotABug
NotABug
Planned
Sponsor Priority
Sponsor Priority
bug
documentation
duplicate
enhancement
needs more info
no-activity
no-priority
not-assigned
pull-request
react-conversion
react-conversion
roadmap
security
stale
unconfirmed-by-user
unconfirmed-by-user
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/CIPP#2624
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @Cortec-IT on GitHub (Feb 24, 2026).
Original GitHub issue: https://github.com/KelvinTegelaar/CIPP/issues/5448
Please confirm:
Problem Statement
The current alert for admins that have no form of MFA only looks at if they have a registered method or not. There are cases where an admin has a registered method but after setup, the per user, security defaults or conditional access policy has been removed. This means the admin effectively has no MFA. Could this alert also include admins that do not have a tick in any of the MFA enforcement methods?
Benefits for MSPs
Could save someone's whole tenant from being breached...
Value or Importance
Critical, need to find admins that are at risk
PowerShell Commands (Optional)
No response