Hi Chris,
I was trying to allow users to automatically connect to the VPN when they first login to their laptops remotely. Giving them limited access to some internal applications / systems - e.g. AD, corp Intranet site, holiday booking system etc. If users need to access more sensitive applications / systems - e.g. file server, tier 1 applications etc. They would need to connect with MFA/2FA for enhanced security. Not just allowing the username / password passthrough when logging onto the laptop for limited access. The clients are running a mixture of Windows 10 and Windows 7 OS connecting to Active Directory. We don't have MFA/2FA in production yet, but I have been testing it with an on prem Microsoft NPS server connecting to Azure AD which seems to be working well. The limited access is for convenience and to force end users to connect back to the main network for checking into AD, having new group policies pushed out etc. We use Office 365 for email and some file sharing, so we have a large number of back office staff who never have a requirement to connect back to the main network. This can cause issues with managing the end user experience.