MFA on every account is the most effective control against the credential-theft attacks that dominate the 2026 UAE threat landscape. We deploy phishing-resistant MFA using Entra ID, FIDO2 security keys, Windows Hello for Business, and certificate-based authentication. Replaces shared passwords and SMS codes (which attackers now bypass routinely) with auth that actually holds up against adversary-in-the-middle attacks.

FIDO2 security keys (YubiKey, Feitian), Windows Hello for Business, certificate-based auth via Intune. Resist adversary-in-the-middle (AiTM) attacks that bypass TOTP and SMS-based MFA.
Microsoft Authenticator with number-matching (not just approve / deny). Passkeys for password-less primary auth. SMS / voice call as last-resort fallback for users without smartphones.
MFA enforced for all users (no break-glass exceptions in normal operation). Per-app policies for sensitive apps, risk-based prompts for unusual sign-ins, location-based controls.
Just-in-time elevation for admin roles. Standing admin access eliminated; admins request elevation, approval, time-boxed. Reduces blast radius if any single account compromises.
Entra ID Protection flags impossible-travel sign-ins, anonymous IPs, atypical activity, leaked-credentials matches. SOC investigates flagged sign-ins within SLA.
Service accounts (the ones MFA originally exempted) are the modern weak point. We migrate to managed identities, certificates, or strictly-scoped credentials with conditional access.
TOTP and SMS MFA are no longer sufficient against AiTM attacks. We deploy FIDO2 and Windows Hello as the default phishing-resistant methods, especially for finance and executive teams.
MFA rollouts fail when user friction is too high. We sequence: pilot, education, soft enforce, hard enforce. Communication, training, fallback plans. The goal is enforcement, not just enablement.
Microsoft-recommended Conditional Access baseline plus UAE-specific extensions (regulator-aligned geofencing, BYOD vs corporate device policies, finance / HR sensitivity tiers).
Most MFA-breach stories involve a service account that was exempted "temporarily" three years ago. We inventory and harden every service account as part of the MFA project. No long-term exemptions.
DFSA, ADGM regulators expect MFA on all access; phishing-resistant for privileged access.
DHA, DOH-licensed entities; PDPL-aligned data protection requires MFA.
POS, payment, e-commerce admin accounts; high-value targets for credential theft.
Client data, financial information, BEC-vulnerable; MFA blocks the dominant attack vector.
OT-IT convergence creates new MFA scope; production system access needs hardening.
Student records, exam data, financial systems; faculty and admin accounts require MFA.
| Feature | FIDO2 + Windows Hello (phishing-resistant) | Microsoft Authenticator (TOTP) | SMS / voice call | Password-only (no MFA) |
|---|---|---|---|---|
Resists adversary-in-the-middle | Partially | |||
Resists SIM-swap attack | ||||
Resists phishing reuse | Vulnerable to AiTM | |||
User experience | Tap key or biometric | Open app, type code | Receive SMS | Easiest, weakest |
Cost per user | Hardware key purchase + Entra ID | Entra ID licence | SMS gateway cost | Zero, high incident cost |
Suitable for executives, finance, admins | Acceptable | Not recommended | Not acceptable | |
Suitable for general users | Increasingly default | Fallback only | Not acceptable in 2026 | |
Regulator expectation | DFSA / ADGM increasing | No longer sufficient | Below minimum |
1-2 weeks
User and service-account inventory. Privileged-role inventory. Conditional Access policy design. MFA method selection per user tier. Output: written MFA programme design.
2-3 weeks
Pilot user group (typically IT, security, executives) enrolled. Microsoft Authenticator with number-matching for general users; FIDO2 keys for privileged tier. Friction captured.
2-3 weeks
MFA required for all users with grace period for first-time enrolment. Communication to all staff. Service desk briefed for enrolment support. PIM enabled for admin roles.
1-2 weeks plus continuous
MFA enforced without exception. Service accounts hardened. Identity Protection monitoring active. Quarterly review of exemptions, enrolment status, security alerts.
“We thought we had MFA. Then a credential-theft attack against our finance director showed us our MFA was TOTP through Authenticator, which was bypassed by an AiTM phishing page. GR migrated us to FIDO2 keys for privileged users and number-matching Authenticator for everyone else within 8 weeks. The same attack pattern would no longer work. Should have done this two years ago.”
A 30-minute scoping call covers your current MFA state, user populations, service-account inventory, target enforcement timeline. Output: written MFA programme proposal with phasing and method-mix.
Explore more solutions that work great with this service