How to Use Powershell to Export MFA Status by User

Multi-Factor Authentication (MFA) is essential to working in today’s business environment securely. MFA is an authentication method in which a computer user is granted access only after successfully presenting two or more pieces of evidence (or factors) to an authentication mechanism. The pieces of evidence can include knowledge (something the user and only the user knows), possession (something the user and only the user has), and inherence (something the user and only the user is).

Enabling MFA for hundreds or thousands of users can be a challenge. Knowing which method they used to configure MFA out of the available options is also not available from the Azure AD portal. That’s where Windows PowerShell comes in.

Below is a script that you can download and run against your Microsoft 365 Tenant to see which users and which method have been enrolled in MFA. You will need to have the prerequisites for Powershell remoting as shown here:

Below I will explain how to run this report and view the MFA status of each user.

  1. Download the following script,, and then right-click on the downloaded script and select “Run with PowerShell.”
    Run with Powershell
  2. Now the credential window will pop up. Type in your global administrator username here and select Next.
    sign in window
  3. Type in your Global Administrator Password and select Sign In.
    enter password screen
  4. The Script is now running and reviewing the users in your tenant and gathering the information. This may take some time to complete.
    running script
  5. When the script finishes running, if there was data to report, it will prompt you to open the output file. Choose Yes.
    open output file dialog box
  6. The file will be in the same directory from where you ran the script, the name is based on the date and time the script was run.
    file location
  7. From the sample data below, you can see that Columns E and F contain the MFA options set for the named account in that row.
    Here are the methods that can be seen:

    • OneWaySMS – Your standard text message code – 6 digits with one time use
    • TwoWayVoiceMobile –Your standard voice call – will provide one-time password over the phone
    • PhoneAppOTP –Microsoft Authenticator with a 6-digit one time password
    • PhoneAppNotification –Microsoft Authenticator but also with the notification approval method
Column A – Display name in the user list Column G – MFA configured phone number
Column B – The user principle name to login to office365 Column H – MFA configured backup email address
Column C – MFA status for the account Column I – User license status
Column D  – Activation status Column J – Account admin status
Column E – Default MFA method Column K – Account admin roles
Column F – All configured MFA methods Column L – Account sign in status

sample data

Do you need help with setting up MFA? Contact the Sikich Team today!

This publication contains general information only and Sikich is not, by means of this publication, rendering accounting, business, financial, investment, legal, tax, or any other professional advice or services. This publication is not a substitute for such professional advice or services, nor should you use it as a basis for any decision, action or omission that may affect you or your business. Before making any decision, taking any action or omitting an action that may affect you or your business, you should consult a qualified professional advisor. In addition, this publication may contain certain content generated by an artificial intelligence (AI) language model. You acknowledge that Sikich shall not be responsible for any loss sustained by you or any person who relies on this publication.

About the Author