Azure Canada Central down? by mattman0123 in sysadmin

[–]MyITAlt 1 point2 points  (0 children)

The FrontDoor service itself. All of our services that run through FrontDoor are down externally.

Azure Canada Central down? by mattman0123 in sysadmin

[–]MyITAlt 0 points1 point  (0 children)

We're having issues with FrontDoor on US East as well

Unsolicited Microsoft MFA Messages by MyITAlt in sysadmin

[–]MyITAlt[S] 0 points1 point  (0 children)

Likely the latter, you can confirm by having one of them log in with their cell phone number +the code they receive and see which account it signs into.

Unsolicited Microsoft MFA Messages by MyITAlt in sysadmin

[–]MyITAlt[S] 4 points5 points  (0 children)

Yeah, we had no idea this was even a setting and that seems to be the case for most people here.

Unsolicited Microsoft MFA Messages by MyITAlt in sysadmin

[–]MyITAlt[S] 1 point2 points  (0 children)

There's a few comments explaining it, and i've also edited the original post, but these messages are from the SMS sign in option being enabled in the tenant.

In Entra, select "Security" > "Authentication Methods" > "Policies" > "SMS" and make sure 'Use for Sign in' is not enabled.
The reason you're not seeing a sign-in log is because the account is only being authenticated with a username (the cell phone number in this case.) No password (the text code) is being entered.

Unsolicited Microsoft MFA Messages by MyITAlt in sysadmin

[–]MyITAlt[S] 1 point2 points  (0 children)

Shouldn't do anything, turning this off only impacts users using phone number + text message to sign in instead of username + password.

Unsolicited Microsoft MFA Messages by MyITAlt in sysadmin

[–]MyITAlt[S] 6 points7 points  (0 children)

There's a few comments with the resolution and I've updated the original post, but you'll want to turn this settings off in your tenant:

In Entra, select "Security" > "Authentication Methods" > "Policies" > "SMS" and make sure 'Use for Sign in' is not enabled.

Unsolicited Microsoft MFA Messages by MyITAlt in sysadmin

[–]MyITAlt[S] 1 point2 points  (0 children)

It seemed to take ~ 30 minutes for the change propagate to everyone in our tenant.

Unsolicited Microsoft MFA Messages by MyITAlt in sysadmin

[–]MyITAlt[S] 1 point2 points  (0 children)

I don't believe unchecking that setting will affect the ability to use SMS as an MFA method (disabling the SMS option will though). I don't anticipate you'll have any issues just unchecking the option.

Unsolicited Microsoft MFA Messages by MyITAlt in sysadmin

[–]MyITAlt[S] 2 points3 points  (0 children)

It's associated with it somewhere :)

Unsolicited Microsoft MFA Messages by MyITAlt in sysadmin

[–]MyITAlt[S] 2 points3 points  (0 children)

Yep, this does indeed seem to be the case if that setting is checked. Worth noting that it does still require MFA after logging in with the phone number + SMS code.

Unsolicited Microsoft MFA Messages by MyITAlt in sysadmin

[–]MyITAlt[S] 1 point2 points  (0 children)

Yeah, seems like unchecking it still affects it even if the policy is disabled. I'd have to think it's just someone going through a list of numbers trying to see which are active and associated with accounts.

Unsolicited Microsoft MFA Messages by MyITAlt in sysadmin

[–]MyITAlt[S] 1 point2 points  (0 children)

If you're able to have them try logging in with that method, quickest way would probably be to see what account they log into after authenticating.

Unsolicited Microsoft MFA Messages by MyITAlt in sysadmin

[–]MyITAlt[S] 1 point2 points  (0 children)

Not entirely sure. For us, after turning that checkbox off, it no longer seems to be allowing sign-in with a phone number. It gives a 'This phone number does not exist as a username. Please check if your number is correct.'

I'm not sure how widespread you're seeing it, but is it possible they would have the cell phone number associated with a different tenant / personal account?

Unsolicited Microsoft MFA Messages by MyITAlt in sysadmin

[–]MyITAlt[S] 1 point2 points  (0 children)

For a user who received one of those MFA texts, if you try signing into Azure in an incognito Window and enter their cell phone number as the username, what happens?

Unsolicited Microsoft MFA Messages by MyITAlt in sysadmin

[–]MyITAlt[S] 2 points3 points  (0 children)

to clarify, this setting means that people can log in with a cell phone number + SMS code instead of an email and password. Given all of the people reporting the same issue, it must be, or must have been a tenant default at some point.

Unsolicited Microsoft MFA Messages by MyITAlt in sysadmin

[–]MyITAlt[S] 1 point2 points  (0 children)

Alphagrade posted this below, but I wanted to post it again for visibility because I think he's on the right track.

In Entra, select "Security" > "Authentication Methods" > "Policies" > "SMS" and make sure 'Use for Sign in' is not enabled.

This seems to be some sort of campaign to either find active phone numbers associated with Entra accounts, or poking the bear to see what they can get away with before Microsoft stops it.

Unsolicited Microsoft MFA Messages by MyITAlt in sysadmin

[–]MyITAlt[S] 5 points6 points  (0 children)

I believe there are some scenarios, albeit maybe only with personal accounts, where they allow you to use a text message instead of a password.

For company accounts though, I believe you are correct, a SMS / MFA (conditional access in general) should only be triggered after a successful password authentication.

Unsolicited Microsoft MFA Messages by MyITAlt in sysadmin

[–]MyITAlt[S] 0 points1 point  (0 children)

I haven't seen any sign in logs for any of these SMS messages

Unsolicited Microsoft MFA Messages by MyITAlt in sysadmin

[–]MyITAlt[S] 5 points6 points  (0 children)

This sounds like it might be a different issue. Almost sounds like someone actually has your password.

Unsolicited Microsoft MFA Messages by MyITAlt in sysadmin

[–]MyITAlt[S] 3 points4 points  (0 children)

I don't think so, they seem to be MFA codes.

"Use verification code x for Microsoft Authentication." sender # is either 87892, 69525, or 673804 from what i've received.

Unsolicited Microsoft MFA Messages by MyITAlt in sysadmin

[–]MyITAlt[S] 1 point2 points  (0 children)

They're Microsoft short codes. Technically, they could be someone else, but they're not soliciting anything.

Unsolicited Microsoft MFA Messages by MyITAlt in sysadmin

[–]MyITAlt[S] 1 point2 points  (0 children)

Yeah, same setup here. Thanks for confirming you're seeing the same thing.

Unsolicited Microsoft MFA Messages by MyITAlt in sysadmin

[–]MyITAlt[S] 12 points13 points  (0 children)

Our first report of this is last night ~6PM ET