Introduction
It's possible to configure MFA for AVD. This can be done via a Conditional Access policy in Microsoft Entra ID (previously called Azure AD).
Configuration
Under 'Cloud apps or actions', include the following apps:
Workspace SSO App registration
AVD app
You can always exclude certain apps from this Conditional Access policy, or assign specific users and/or groups to the policy.
Under 'Conditions', select Client apps.
Make sure 'Browser' and 'Mobile apps and desktop clients' are selected.
Click Done.
Under Grant, select Require multi-factor authentication.
You may configure the 'Sign-in frequency', this defines the time period before a user is asked to sign in again when attempting to access a resource.
When you're done defining this policy, enable it by choosing 'On'.
Click Create.