Skip to main content
Glama
DynamicEndpoints

BOD-25-01-CSA-Microsoft-Policy-MCP

enforce_phishing_resistant_mfa

Enforce phishing-resistant multi-factor authentication for all users to meet BOD 25-01 compliance requirements in Microsoft 365 environments.

Instructions

Enforce phishing-resistant MFA for all users (MS.AAD.3.1v1)

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault

No arguments

Implementation Reference

  • The handler function that executes the tool logic: patches the Microsoft Graph API /policies/authenticationMethodsPolicy to enable phishing-resistant MFA methods (FIDO2 and Windows Hello for Business).
    private async enforcePhishingResistantMFA() {
      try {
        // Configure MFA policy using Microsoft Graph API
        await this.graphClient
          .api('/policies/authenticationMethodsPolicy')
          .patch({
            policies: {
              fido2: {
                isEnabled: true,
                isSelfServiceRegistrationAllowed: true,
              },
              windowsHelloForBusiness: {
                isEnabled: true,
                isSelfServiceRegistrationAllowed: true,
              },
            },
          });
    
        return {
          content: [
            {
              type: 'text',
              text: 'Phishing-resistant MFA enforced successfully',
            },
          ],
        };
      } catch (error: unknown) {
        throw new McpError(
          ErrorCode.InternalError,
          `Failed to enforce phishing-resistant MFA: ${error instanceof Error ? error.message : 'Unknown error'}`
        );
      }
    }
  • Tool registration in the ListTools response, including name, description, and input schema (empty object).
    {
      name: 'enforce_phishing_resistant_mfa',
      description: 'Enforce phishing-resistant MFA for all users (MS.AAD.3.1v1)',
      inputSchema: {
        type: 'object',
        properties: {},
      },
    },
  • Dispatcher case in the CallToolRequest handler that routes to the enforcePhishingResistantMFA method.
    case 'enforce_phishing_resistant_mfa':
      return await this.enforcePhishingResistantMFA();
  • Input schema definition for the tool (empty object, no parameters).
    inputSchema: {
      type: 'object',
      properties: {},
    },

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/DynamicEndpoints/Automated-BOD-25-01-CISA-Microsoft-Policies-MCP'

If you have feedback or need assistance with the MCP directory API, please join our Discord server