Securing Windows VM servers: MFA without the overhead

Multi-factor authentication (MFA) is essential for securing virtual machines (VMs), but implementation can be complex. Here’s how to simplify VM MFA.

Published November 18, 2025
Securing Windows VM Servers with UserLock MFA

Virtualization is one of the foundations of modern IT, but it is not without its security challenges. The first problem is the sheer volume of virtualized servers (virtual machines, or VMs) admins must now defend, which creates a constantly expanding attack surface for criminals to aim at.

A second issue is that today’s servers are almost always physically remote. In on-premise deployments, this means the servers are in another building while in the case of cloud services they can be thousands of miles away. While this isn’t necessarily less secure, it does increase the chance that a server will be overlooked at some point.

To stay secure, organizations need strong access controls. Multi-factor authentication (MFA) and contextual access control policies are a must. In a Windows environment, IT teams do this either by applying Active Directory (AD) admin policies or by doing the same through Microsoft’s cloud identity and access management (IAM) platform Entra ID (formerly Azure AD).  

But that’s where it gets tricky.

The challenge of implementing MFA for VMs

MFA isn’t baked into virtual server infrastructure. It’s always an extra layer. How these are implemented depends on whether the organization is predominantly on-premise, has migrated to Entra ID, or has adopted some hybrid combination of the two.

What matters most when implementing MFA is not to end up spending money on time-absorbing additional infrastructure if that can be avoided. At the same time, the authentication system must support MFA across multiple types of Windows VMs, including those in the cloud as well as on-premises.

The authentication dilemma: today’s VMs can be anywhere

Originally, a server was a physical machine running a single OS on dedicated hardware. Today, for reasons of scale and efficiency, almost all servers run on VMs in which multiple copies of the OS are run on the same hardware. Clustering allows multiple VMs to be run together as single logical units, with workload distributed using load balancing.

This idea helped to make the cloud possible because it allows large numbers of servers to be run in datacenters operated by service providers. This in turn has allowed organizations to purchase server resources without having to think about their physical provisioning, the basic concept of platform-as-a-service (PaaS).

The downside is that organizations now have two or more environments to manage:

  • Traditional VM servers with their applications running on-premises, and

  • Remote ones in the cloud.

Inevitably, this has a huge bearing on security because it means that organizations must choose whether authentication is managed from their own network using AD or via a third-party service provider.

VM MFA: finding the right option

There's no right or wrong, black and white answer here. Going for an on-prem MFA solution gives organizations more control over security while choosing a third-party authentication provider removes the need to set up and manage what is often complex infrastructure.

One option is to go for Microsoft’s native tools and services.

  1. For cloud-oriented customers: Entra ID identity and access management (IAM) with Entra MFA and Role-Based Access Control (RBAC).

  2. For on-premise and hybrid (mixed on-premise with Microsoft cloud) customers: the above option with a mix of additional tools which, depending on the balance of on-premise and cloud, might include Active Directory Federated Services (AD FS), Entra Connect Sync, and Entra Cloud Sync.

Many organizations find that the downside of using these tools is that they add complexity and, in many cases, extra cost.

The question, then, is how organizations with an on-prem or hybrid setup should best secure their VM infrastructure. They want to add a layer of MFA and access control to secure these vital servers, but without increasing their management overhead.

Implementing MFA for VMs demands careful monitoring

Securing VMs requires well-designed monitoring. MFA is not a set and forget technology and requires constant oversight. This is true for any user login, but is doubly so for server logins protecting a core asset.

This is why one of its most important features of an MFA platform is how information on events is fed back to the admins managing them.

If something suspicious or unusual occurs, admins should always be the first to know. The MFA system should be able to give them the full context around an alert.

UserLock: securing VM servers without the overhead

UserLock was designed to solve these MFA implementation challenges through a single simple-to-implement platform.

For on-premise use, UserLock allows admins to apply MFA and access control policies for VM connections according to existing AD policies. This makes it a simple upgrade to the infrastructure already in place.

UserLock also makes it easy to extend these user identities to the cloud using mechanisms such as UserLock SSO and the AD DS server role. Again, the on-premise AD infrastructure can be used to authenticate VMs running in Microsoft’s cloud. 

That means that organizations oriented towards on-premise control can have the best of both worlds, deploying MFA controls to VMs regardless of where those servers are located.

AD already defines how users and admins access VMs. UserLock simply builds on this to define the MFA and access control policies that suit each organization.

Support for multiple connection and authentication mechanisms

UserLock applies MFA when admins or users authenticate from any connection types (RDP, VPN, SSH) using a range of factors, including push notifications, authenticator apps and YubiKey or Token2 hardware tokens.

Monitoring VM logins for suspicious activity

However, MFA itself is only half the story. Monitoring is also critical. Through UserLock, admins are given comprehensive oversight of authentication events, for example unsuccessful/successful logins.

Importantly, this applies even when those VMs are managed through Entra ID. Any policy violations are immediately flagged for admin attention while the platform’s access controls allow organizations to set restrictions based on location or time of day.

Diligent VM monitoring is part of effective admin. Remember, while low-level VM management is for admins only, the applications running on those servers can be accessed by anyone. Criminals don’t only target admin accounts. Humble user accounts are a popular target too.

Making VM MFA as simple as possible

The dramatic expansion in VM infrastructure has given organizations several headaches.

They know their attack surface has grown, which means MFA is now essential.

However, implementing it can be complex. Managing VMs in hybrid environments means closing gaps in identity and authentication across on-premises and cloud platforms. 

Platforms tend to assume that all organizations are moving, or are already using, a cloud identity provider (IdP). Not only is this not true, but it also has disadvantages for those who value the control and certainty offered by on-premise AD.

UserLock offers a way to simplify VM security. Simply continue using the on-premises authentication database you already have: Active Directory. And it does this without losing the ability to manage and monitor cloud VMs via Entra ID.

XFacebookLinkedIn

Daniel Garcia Navarro

Engineering Director, IS Decisions

Daniel Garcia is Engineering Director at IS Decisions, where he leads the development of secure and scalable access management solutions. He holds a Master’s degree in Telecommunications Engineering and brings strong technical expertise to enterprise identity security.