Huntress logo
Huntress
Create
Roadmap
Feedback
Managed ITDR
365
Changelog
Category
New Functionality
Voters
P
Peter de Ruiter
S
Scot Turner
Robert Crum
R
Robbie Hughes
G
Gabriel Miller
P
Parth Ghetia
P
Peter Strahan
T
Tim Odom
S
Simon Ronald
J
Jack Duff
and 138 more...
Powered by Canny
MFA Visibility Improvements
planned
member badge
Rich Mozeleski
January 16, 2025
member badge
Rich Mozeleski
Merged in a post:
MFA Reporting Enhancements
member badge
Rich Mozeleski
Currently, we’re accurately representing the data we get from MS, but the visual could be better. This is the ability for us to more accurately display MFA status for identities.
February 24, 2025
5 days ago
S
Scot Turner
This feature would be VERY valuable. Many/Most/All of our tenants do not have the P1/P2 license. But the data is still there. Entra Admin shows the user accounts and whether MFA is disabled/enabled/enforced. So Huntress should be able to pull that and accurately display that in ITDR. Hugely beneficial.
·
April 2, 2026
·
Reply
R
Robbie Hughes
We really really need visibility on clients that don't have P1 and/or don't use Microsoft authenticator. We deal with A LOT of small clients that don't have the budget for Premium. For us the MFA feature in Huntress is currently useless.
·
March 27, 2026
·
Reply
D
Dave Irvine
The MFA data is actually not currently accurately represented in the ITDR management interface. If you manually apply MFA to individual identities, yes, it is accurate, but if you apply MFA via policy (for instance, create a group whereby any identity added to the group has MFA forced on it) the ITDR management interface currently utterly ignores that these identities are MFA-enabled. With larger clients management by policy is the only realistic approach. We hope to see ITDR catch up to this reality. Case and point: we have a client with 678 identities - totally impractical to manage MFA identity-by-identity, so we do so by policy. ITDR management says that 305 of them are not MFA-enabled, but the reality is that only 5 of them are not MFA-enabled. The filter simply does not see MFA-enabled identities that were MFA-enabled by policy.
·
July 25, 2025
·
Reply
T
Tyler Gress
Including "last interactive login" in the table view makes a lot of sense to me. Or better yet, last activity. I suspect a lot of the users I see with MFA off in this view are stale accounts. Having this "recent activity" information would make it easy to just lock out the accounts and move on.
·
February 17, 2025
·
Reply
T
Tyler Gress
There are a few ideas discussed here. What is the summary of the planned feature?
·
February 17, 2025
·
Reply
member badge
Rich Mozeleski
marked this post as
planned
·
January 17, 2025
·
Reply
member badge
Rich Mozeleski
Merged in a post:
Ability to Hide MFA Status within Managed ITDR Dashboard
Nick Gusto
Partners who don't have the adequate amount of Entra ID P1 or P2 licenses required to display the correct MFA status would like the ability to hide the MFA status from their dashboard altogether.
November 22, 2024
January 16, 2025
member badge
Rich Mozeleski
Merged in a post:
MFA Status page - Filter out Disabled users
W
Wes Parton
In the MFA Status page there is a toggle for 'Billable' and 'Disabled'. If we select 'Disabled' it ONLY shows Disabled users, however, it would be more use to have a filter to NOT show disabled users, as these are blocked from Sign in.

Photo Viewer

View photos in a modal

August 8, 2024
January 16, 2025
member badge
Rich Mozeleski
Merged in a post:
Show Enable vs Enforce in 365
J
John Waskewics
365 MDR should be able to differentiate between MFA enabled vs enforced
August 30, 2023
January 16, 2025
Load More
→
Powered by Canny