Sourcepass Blog

FIDO2 Rollout for SMBs - Phishing Resistant MFA in M365

Written by Admin | Apr 18, 2026

For many small and mid-sized businesses, turning on MFA once felt like the finish line for identity security. SMS codes and push notifications improved protection, and many insurers treated any MFA as a milestone. That baseline has shifted. Attackers now use phishing kits that proxy login sessions in real time and exploit push fatigue to gain approvals. As a result, regulators and insurers increasingly expect phishing-resistant MFA, with FIDO2 passkeys as a core control.

Phishing-resistant MFA changes the model. Instead of relying on codes or approvals that users can be tricked into providing, it uses cryptographic keys bound to a legitimate domain. With FIDO2, the private key never leaves the device or hardware token, and the authenticator only responds to the correct website. This prevents replay attacks even if a user lands on a convincing phishing page. Guidance from Cybersecurity and Infrastructure Security Agency reinforces this approach in its fact sheet on phishing-resistant MFA, and Microsoft Entra ID positions FIDO2 and passwordless authentication as preferred methods for high-value accounts.

For SMBs operating in Microsoft 365 environments, this is not a future-state initiative. FIDO2 security keys and passkeys are already supported, often within existing licensing. The challenge is execution. Moving from basic MFA to phishing-resistant MFA requires a staged, operationally sound rollout that balances security with usability.

 

Why SMBs must move beyond basic MFA to phishing-resistant FIDO2

Basic MFA methods such as SMS and push notifications introduce risk in three areas:

  • Real-time phishing proxies can intercept one-time passcodes
  • MFA fatigue attacks rely on repeated push approvals
  • Social engineering can bypass weak recovery processes

FIDO2 eliminates these weaknesses by tying authentication to the domain and device. There is no shared secret to steal, and no approval to coerce. For SMB executives and IT leaders, the outcome is measurable risk reduction in account takeover scenarios, particularly for privileged users and finance workflows.

A practical starting point is a current-state assessment:

  • Which authentication methods are in use today
  • Which users hold privileged or high-risk roles
  • Which applications rely on legacy authentication

From there, prioritize high-risk identities instead of attempting a full-scale rollout. Early focus should include administrators, finance, HR, and executives.

 

Design a phishing-resistant MFA architecture with FIDO2 and Microsoft 365

Designing a phishing-resistant MFA architecture in Microsoft 365 starts with identity centralization in Microsoft Entra ID and enforcement through Conditional Access.

 

Enable FIDO2 and passkeys

Begin by enabling FIDO2 security keys and passkeys in Authentication Methods policy. Scope initial access to a pilot group to validate:

  • Device compatibility across Windows, macOS, and mobile
  • Browser support for WebAuthn
  • Enrollment workflows and user experience

Platform authenticators such as Windows Hello for Business and mobile passkeys work well for most users. Hardware tokens provide stronger assurance for admins and regulated roles.

 

Apply Conditional Access policies

Use Conditional Access to require phishing-resistant MFA for:

  • Admin portals and privileged roles
  • Remote access scenarios
  • Sensitive applications such as ERP or financial systems

Gradually phase out SMS and voice-based MFA where possible. Maintain controlled fallback methods with strict monitoring.

 

Address legacy systems

Many SMB environments still include legacy protocols such as IMAP, POP, or basic SMTP authentication. These cannot enforce modern authentication directly. Instead:

  • Disable legacy protocols where possible
  • Place legacy apps behind secure access layers such as application proxies or zero trust gateways
  • Require FIDO2-based authentication at the entry point

This ensures all access paths enforce phishing-resistant controls, even if backend systems lag behind.

 

Define lifecycle and recovery

Authentication is not just a control, it is a lifecycle process. Establish:

  • Enrollment standards, including at least two authenticators per user
  • Device issuance and revocation procedures
  • Secure recovery processes with identity verification and approvals

Without strong recovery controls, attackers may bypass FIDO2 through help desk manipulation.

 

Measure adoption, KPIs, and partner with a managed security provider

Technical deployment alone does not ensure success. Adoption, measurement, and ongoing operations determine long-term value.

 

Rollout in phases

Use a ring-based deployment model:

  • Ring 1: IT and security teams
  • Ring 2: High-risk roles such as admins and finance
  • Ring 3: Broader workforce

Provide clear communication, internal documentation, and extended support during enrollment windows.

 

Track meaningful KPIs

Focus on a concise set of metrics:

  • Percentage of sign-ins using phishing-resistant MFA
  • Coverage of privileged accounts with FIDO2
  • Number of users with multiple authenticators
  • Reduction in phishing-related incidents
  • Help desk tickets related to authentication

Microsoft reporting tools, including Secure Score and Entra ID authentication reports, provide visibility into these metrics.

 

Integrate managed security operations

Many SMBs benefit from a managed or co-managed approach. A security-focused provider can:

  • Design and maintain Conditional Access policies
  • Monitor for risky sign-ins and token abuse
  • Support incident response and remediation
  • Identify gaps such as weak fallback methods

This operational layer ensures phishing-resistant MFA remains effective as threats evolve.

 

Review and iterate

Phishing-resistant MFA should be reviewed quarterly as part of a broader security program. Use insights from authentication data to:

  • Target departments with low adoption
  • Eliminate remaining weak factors
  • Refine user training and onboarding

Over time, this creates a measurable, defensible identity security posture aligned with insurer and regulatory expectations.

 

FAQ

What is phishing-resistant MFA?

Phishing-resistant MFA is an authentication method that cannot be intercepted or replayed by phishing attacks. It uses cryptographic keys bound to a legitimate domain, such as FIDO2 passkeys, instead of codes or approvals that users can be tricked into sharing.

How does FIDO2 improve Microsoft 365 authentication?

FIDO2 improves Microsoft 365 authentication by eliminating shared secrets like passwords and one-time codes. In Microsoft Entra ID, FIDO2 uses device-bound keys that only authenticate to trusted domains, preventing credential theft and replay attacks.

Do SMBs need hardware security keys for FIDO2?

Not always. Many users can rely on platform authenticators like Windows Hello or mobile passkeys. Hardware security keys are recommended for administrators, shared devices, and high-risk roles that require stronger assurance.

Can phishing-resistant MFA work with legacy applications?

Yes, but indirectly. Legacy applications that do not support modern authentication can be placed behind secure access layers such as application proxies or zero trust gateways, where phishing-resistant MFA is enforced before access is granted.

What are the first steps to implement phishing-resistant MFA?

Start by assessing current authentication methods, identifying high-risk users, and enabling FIDO2 in a pilot group. Then apply Conditional Access policies, phase out weak factors, and expand adoption in stages.

How do you measure success for a FIDO2 rollout?

Success is measured through adoption and risk reduction. Key metrics include the percentage of users using phishing-resistant MFA, coverage of privileged accounts, reduction in phishing incidents, and authentication-related support trends.