Make Trusted IPs a Standard Feature of MFA for Office 365 and MFA for Azure AD Admins
Not being able to set Trusted IPs for MFA for our Office 365 users and Azure AD admins is the primary reason we have not implemented MFA.
For admins, admin tasks are done almost exclusively while on our LAN. When we tried enabling MFA, it was too cumbersome to use when authenticating to each service in PowerShell.
For Office 365 users, our biggest threat is compromised credentials being used by malicious actors from outside of our company. Requiring MFA to be used while on our LAN slows down the adoption of all but the most basic Office 365 services (in many cases, just email) since our users want to avoid the additional steps for MFA as much as possible.
It's sad that Microsoft wants an additional $6 user/month to enable this feature. Does it work with Azure AD Basic?