Multi-Factor Authentication (MFA) is like adding an extra lock to your front door – even if someone steals your key (password), they still can’t get in without a second proof, like a code on your phone.
But here’s the thing – not every device needs the same level of interruption.
In Microsoft 365 and Entra ID (formerly Azure AD), you can set up MFA on unmanaged devices (personal devices or ones not controlled by your IT team) without making life harder for staff on company-managed computers.
This setup, often called Multi-Factor Authentication for unmanaged devices or BYOD MFA policy, is perfect for:
- Protecting your data from risky logins
- Avoiding extra MFA prompts on trusted, compliant devices
- Enforcing stronger security on personal laptops, phones, or tablets that don’t follow company policies
With Conditional Access, you can require MFA for unmanaged personal devices, exclude managed devices from MFA prompts, and even fine-tune rules for BYOD setups.
This guide will show you how to configure Conditional Access MFA for unmanaged devices step-by-step, so you get the best MFA solution for BYOD setups without slowing down your team.