Skip to content
  • There are no suggestions because the search field is empty.

E8 Guide | Multi-factor Authentication

This article explains how Devicie supports the multi-factor authentication controls recommended by the ACSC Essential Eight.

Multi-factor authentication (MFA) strengthens account security by requiring two or more forms of verification. This makes it much harder for attackers to gain unauthorised access, even if credentials are compromised. The ACSC recommends MFA for all privileged accounts, remote access, and access to sensitive systems. Devicie supports this strategy by configuring Windows Hello for Business (WHfB) to meet the E8 requirements for MFA at the device level.

What's Covered

Devicie supports the following controls related to multi-factor authentication:

  • Configuration of Windows Hello for Business through Intune policy templates.

  • MFA using secure methods such as PIN plus TPM-backed credentials or biometrics.

  • Device-level MFA enforcement integrated with Microsoft Entra ID.

  • Deployment of authentication method policies without requiring manual setup on each device.

What’s Not Covered

The following areas are outside Devicie’s scope and remain the responsibility of the customer:

  • MFA enforcement for cloud apps and services via Conditional Access — this must be configured in Microsoft Entra ID.

  • Integration with third-party MFA providers (e.g. Duo, Okta) outside of WHfB.

  • MFA for legacy applications or services that do not support modern authentication.

  • Continuous monitoring or enforcement of MFA usage across non-managed devices.

Potential Impact and Callouts

When implementing this Essential Eight mitigation strategy, it's important to understand the impacts on your environment and end users so that you can better plan your change processes.

  • Full compliance depends on customer configuration of Conditional Access to enforce MFA for all required scenarios.

  • Devices must have compatible hardware (e.g. TPM, biometric sensors) to use WHfB.

  • Some older applications may not work if they do not support modern authentication.

Devicie Delivered Controls

ML1 ML2 ML3
Multi-factor authentication uses either: something users have and something users know, or something users have that is unlocked by something users know or are. Multi-factor authentication used for authenticating users of systems is phishing-resistant. Multi-factor authentication used for authenticating users of data repositories is phishing-resistant.
  Successful and unsuccessful multi-factor authentication events are centrally logged.  
  Multi-factor authentication is used to authenticate unprivileged users of systems.  
  Multi-factor authentication is used to authenticate privileged users of systems.  

 

Customer Responsibility

ML1 ML2 ML3
Multi-factor authentication (where available) is used to authenticate users to third-party online services that process, store or communicate their organisation's non-sensitive data. Multi-factor authentication used for authenticating users of online services is phishing-resistant. Multi-factor authentication used for authenticating customers of online customer services is phishing-resistant.
Multi-factor authentication is used to authenticate users to third-party online customer services that process, store or communicate their organisation's sensitive customer data. Multi-factor authentication used for authenticating customers of online customer services provides a phishing-resistant option. Multi-factor authentication is used to authenticate users of data repositories.
Multi-factor authentication is used to authenticate customers to online customer services that process, store or communicate sensitive customer data.    
Multi-factor authentication is used to authenticate users to their organisation's online customer services that process, store or communicate their organisation's sensitive customer data.    
Multi-factor authentication is used to authenticate users to their organisation's online services that process, store or communicate their organisation's sensitive data.    
Multi-factor authentication is used to authenticate users to third-party online services that process, store or communicate their organisation's sensitive data.    

💡 Tip: Use the Devicie Essential Eight report to view all controls broken down by strategy, maturity level and responsibility.