
Microsoft has announced that administrators using Microsoft 365 will be required to enable multi-factor authentication (MFA) by February 9, after which access to the Microsoft 365 admin center will be blocked for accounts that do not comply. The move represents another step in Microsoft’s broader effort to standardize stronger security practices across its cloud-based services, particularly for accounts with elevated privileges.
According to a statement cited by BleepingComputer, Microsoft emphasized that enabling MFA within the Microsoft 365 admin center plays a critical role in reducing the risk of account compromise. By adding an additional verification layer beyond passwords, MFA helps prevent unauthorized access and protects sensitive organizational data from common attack vectors such as credential theft, phishing campaigns, and brute-force login attempts. Given the central role of the admin center in managing users, licenses, and security settings, the company views MFA as a baseline requirement rather than an optional safeguard.
This requirement aligns with similar policies Microsoft has already enforced across other platforms, including Azure and Microsoft Entra. In those environments, MFA has become mandatory for administrative access, reflecting a consistent security strategy that prioritizes identity protection. Microsoft has indicated that this approach will continue to expand, with the long-term goal of making multi-factor authentication a default and mandatory component across its entire service ecosystem.
By extending MFA requirements to Microsoft 365 administration, Microsoft is signaling a shift toward stricter access controls for cloud management interfaces. Organizations that have not yet implemented MFA for administrative accounts are now facing a firm deadline, reinforcing the expectation that modern enterprise security must account for evolving threats and increasingly sophisticated attack techniques.

