Multifactor authentication, in general, is a common way to protect enterprise workloads in the cloud. There are several factors to keep in mind to set up the Azure Multi-Factor Authentication service and to provide greater benefit in the long run.
To set up Multi-Factor Authentication for Azure Active Directory (AD), administrators first need to enable the Multi-Factor Authentication service for their accounts. There is no additional cost to secure an administrator account, and it’s something admins should always do, as it provides an additional layer of protection. The cost model only kicks in when users need to authenticate. But be sure to choose your model carefully — in general, the per-user cost model, rather than the per-authentication model, is more cost-effective.
Admins need to enable Azure Multi-Factor Authentication for their accounts via the classic portal. Microsoft has not yet released this functionality for the current Azure Resource Manager portal.
Log into the classic Azure AD, and select multi-factor auth providers. This will show any current Azure Multi-Factor Authentication configurations.