Microsoft 365 has started enabling security defaults and eventually require users to enable 2FA/MFA. Though for some tenants this may not happen if it was specifically disabled by an admin. Since 2FA/MFA is generally best practice now it should be enabled. The way it's enabled is important though depending on your security needs. We recommend enforcing it via the Per-User MFA interface. If you don't do this then when someone logs in, Microsoft determines if the login is a risk and decide to prompt for an MFA code (or not); I've logged into on a totally new computer and a totally different ISP without being prompted for MFA when it was enabled; enforcing it ensures it's always asked for.
When you enforce MFA, it will log the user out of all of their applications. So Outlook on their computer and E-mail on their phone, their Office subscription, etc will all need to be logged back in. When they log in to the first device, after entering their password they'll be greeted with More information required prompt.
To reset someone's MFA, go back to Per-User MFA, select their account and click on Manage user settings. Check all 3 boxes and click on save. This should log them out of all of their devices and prompt them to re-setup MFA.
To customize things go to service settings at the top of the Per-User MFA page. Here you can set the options for how long a user can have devices that use MFA remembered (meaning they won't be prompted for MFA again on this device), how they can verify their accounts and if you want to allow users to create app passwords or not. For one client, the app password option wasn't available on a Microsoft 365 account, even though it was enabled here. Turning it off then on again in the web interface caused the option to then show up in the clients account… so even turning it off and on here may be needed…