From 5152cc47be1c8aab2d7b9f9a4ff04b1d831e0d76 Mon Sep 17 00:00:00 2001 From: AdminDroid <49208841+admindroid-community@users.noreply.github.com> Date: Sat, 17 Aug 2024 15:23:57 +0530 Subject: [PATCH] Create README.md --- .../README.md | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) create mode 100644 List M365 Users Registered MFA Authentication Methods/README.md diff --git a/List M365 Users Registered MFA Authentication Methods/README.md b/List M365 Users Registered MFA Authentication Methods/README.md new file mode 100644 index 0000000..a6cc066 --- /dev/null +++ b/List M365 Users Registered MFA Authentication Methods/README.md @@ -0,0 +1,16 @@ +## Get Microsoft 365 Users’ Registered MFA Methods With PowerShell +Weak authentication methods can be a gateway for attacks & data leaks. Quickly review Microsoft 365 users' registered MFA authentication methods with this PowerShell script! + +***Sample Output:*** + +The script exports an output CSV file that looks similar to the screenshot below. + +![Registered MFA Methods in Microsoft 365](https://o365reports.com/wp-content/uploads/2024/08/Registered-MFA-Methods-in-Microsoft-365-768x186.png?v=1723549564) + +## Microsoft 365 Reporting Tool by AdminDroid +Looking for more in-depth reporting? [AdminDroid Microsoft 365 reporting tool](https://admindroid.com/?src=GitHub) offers an extensive collection of over 1800 out-of-the-box reports and dashboards. It’s the perfect complement to your PowerShell scripts. + +*View more comprehensive MFA reports through AdminDroid: [https://demo.admindroid.com/#/1/11/reports/70021/1/20](https://demo.admindroid.com/#/1/11/reports/70021/1/20)* + + +