Cybersecurity2026-05-1411 min read

MFA Rollout Playbook: 90 Days to 100% Coverage in a UAE Business

How to roll out multi-factor authentication across a UAE business in 90 days with minimal disruption. The phased plan, the policies to set, the resistance to expect, and the metrics to track.

ByMohd Ahsan
Back to Blog
MFA Rollout Playbook: 90 Days to 100% Coverage in a UAE Business

Multi-factor authentication is the single highest-ROI cybersecurity control available to a UAE business in 2026. It prevents over 99% of automated account compromise. It costs almost nothing per user when bought as part of Microsoft 365 or Google Workspace. And yet most UAE businesses are still at 60 to 80% MFA coverage, with the gaps concentrated in exactly the accounts that get attacked: executives, finance, vendor-master administrators, service accounts.

This is a 90-day rollout playbook to get a UAE business from wherever it is now to 100% MFA coverage, with minimal user friction and zero unplanned lockouts. Written for the IT lead, security officer, or CIO who has to actually run the deployment.

Why MFA is non-negotiable in 2026

  • Microsoft's own data shows 99.9% of compromised accounts in 2024 did not have MFA enabled.
  • Phishing kits available on the open web can capture passwords for any major SaaS in minutes. Password alone is not a credential anymore.
  • UAE-specific: PDPL, DFSA, ADGM, NESA frameworks all expect MFA as a baseline control. Auditors increasingly ask for evidence of universal MFA, not partial.
  • Cyber-insurance underwriters require MFA on email, admin accounts, and remote access for any policy issued in 2025 onward.

If your business is below 100% MFA in 2026, it is not a question of whether you get breached, it is when.

The 90-day plan

Phase 1, days 1 to 15: assessment and baseline

  • Run the Microsoft Entra ID MFA report (or Google Workspace equivalent). Get the exact list of who has MFA, who does not, and which methods are registered.
  • Categorise users: standard employees, executives, admins, service accounts, vendor accounts.
  • Identify the methods you want allowed: Microsoft Authenticator app (preferred), FIDO2 hardware key (for admins), SMS as fallback only.
  • Get executive sign-off: a written paragraph saying "MFA is mandatory by [date] for all users." This unblocks every conversation that follows.
  • Set up the support model: who answers the "I cannot sign in" calls during rollout.

Phase 2, days 16 to 45: pilot and policy setup

  • Pilot group: IT team plus 30 to 50 friendly users. They register MFA, use it for two weeks, report friction.
  • Conditional Access policies set up but not yet enforced: legacy auth blocked, MFA required for management portals, admin accounts MFA-required, all users MFA-required (initial scope: pilot group).
  • Communications start: company-wide email and intranet post: "MFA is rolling out. Here is what to expect. Here is how to register."
  • Self-service registration enabled: users can register MFA methods themselves at https://aka.ms/mfasetup without IT intervention.
  • Documentation written: one page on "how to register MFA on Authenticator" in English (and Arabic if relevant for your business).
  • Lessons from pilot captured and policies tuned.

Phase 3, days 46 to 75: phased enforcement

  • Week 1: enforce MFA for all admins (this group should already be 100% by now).
  • Week 2: enforce MFA for executives and finance (highest-risk accounts).
  • Week 3: enforce MFA for business unit 1 and 2 (typically Operations, Sales).
  • Week 4: enforce MFA for remaining business units.
  • Support team is on standby for the first 48 hours of each wave. Most issues are MFA registration on the wrong phone number or expectations of "I have not been told."

Phase 4, days 76 to 90: service accounts and lockdown

  • Service accounts that cannot use MFA: move to managed identities, certificate-based auth, or workload identities. Where unavoidable, scope these accounts to specific apps, restrict to known IPs, and audit monthly.
  • Vendor and partner accounts: enforce MFA for any external collaborator with access to internal systems.
  • Block legacy authentication tenant-wide. This is the move that closes the most common bypass.
  • Conditional Access tuning: location-based policies, sign-in risk-based policies, device-compliance policies. The full Zero Trust posture.
  • Final report to executive sponsor: 100% coverage, residual exceptions documented, plan for ongoing audit.

Methods: what to use and what to avoid

Use these

  • Microsoft Authenticator app (push notification): default for almost every user. Free. Works on any smartphone.
  • FIDO2 hardware key (YubiKey, similar): mandatory for global admins and break-glass accounts. Phishing-resistant. About 1 to 2 keys per admin (primary + spare).
  • Authenticator with number-matching: Microsoft's default in 2024+, prevents push-fatigue attacks. Make sure it is enabled tenant-wide.
  • Passkeys (Windows Hello, FIDO2 platform): phishing-resistant, no second device needed. Roll out where supported.

Avoid where possible

  • SMS: known weakness (SIM swap attacks). Fallback only, with friction. Many UAE businesses still over-rely on it.
  • Voice call: same weaknesses as SMS, slightly worse UX.
  • Email-based codes: defeats the point if email is the thing being protected.

Resistance to expect, and how to handle it

"I do not have a work phone"

About 5 to 10% of UAE users will claim this. Three responses: provide the Authenticator app to install on their personal phone (it does not access personal data); provide a low-cost work-phone for those who genuinely need one; FIDO2 key for the few who cannot or will not use either. Do not back down on the requirement.

"I am the CEO, the rule should not apply to me"

The CEO is the most-targeted account in the business. The rule applies to the CEO more than to anyone else. Have the conversation in advance with the executive sponsor. When the moment comes, the conversation is already done.

"I keep getting MFA prompts every five minutes"

Symptom of badly-configured Conditional Access policies. Tune the policies so MFA prompts trigger on risky events (new location, new device, sensitive app), not every single sign-in. With proper tuning, most users see MFA prompts a few times per week, not many per day.

"It is breaking my application X"

Usually means the application is using legacy authentication. Two responses: update the application to use modern auth (preferred); create a targeted exception for the application with compensating controls (allowlist IP, restricted account scope). Never blanket-disable MFA.

Metrics to track

  • MFA coverage: percent of accounts with at least one method registered. Target 100%.
  • MFA enforcement: percent of sign-ins challenged for MFA (where applicable). Should be 100% for admin accounts, high for everyone else.
  • Method distribution: what percent of users on Authenticator vs SMS vs FIDO2. Goal: move users off SMS over time.
  • Phishing-resistant coverage: percent of admins on FIDO2 or passkeys (no Authenticator app). Target 100% for global admins.
  • Help-desk tickets related to MFA: spike during rollout, drops within 4 to 6 weeks. If it stays high, support docs need work.

The cost question

If you are on Microsoft 365 Business Premium, E3, or E5, MFA is included. No separate cost. Same for Google Workspace Business Standard and above. The cost of MFA is consulting effort and project management, not licensing.

For most UAE mid-market businesses, the rollout costs less than the average ransomware incident it prevents. Probably the highest-ROI security project available.

FAQs

What about MFA-fatigue attacks?

Attackers spam push notifications hoping the user clicks accept. Microsoft Authenticator with number-matching (default in 2024+) prevents this. Make sure number-matching is enabled tenant-wide.

How do we handle break-glass accounts?

Two emergency accounts with FIDO2 keys stored in a sealed safe. Excluded from Conditional Access. Audited monthly. Only used when normal access fails. Standard pattern.

What about shared mailboxes and service accounts?

Shared mailboxes do not have user sign-in, so MFA is not relevant. Service accounts: prefer managed identities (no credential needed). Where credentials are needed, use certificate-based auth or workload identity with conditional access scoped to the application.

How does this work with Bring Your Own Device?

BYOD is fine: the Authenticator app on the user's personal phone provides the second factor without you managing the phone. Combine with Intune App Protection Policies to protect work data on personal devices without managing the device itself.

How long does each phase actually take in practice?

For a 200-user UAE business with reasonable communications: 90 days end to end, with most user effort concentrated in the 30-day enforcement phase. For larger businesses (1,000+ users) plan 120 to 150 days; the support load during enforcement is the constraint, not the technical setup.

If you want a partner to run the MFA rollout for your UAE business end-to-end, contact us or call +971 56 613 2743. We have shipped 100% MFA coverage for UAE businesses across healthcare, finance, retail, professional services.

Share this article: