Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Set Up Multi-Factor Authentication for Office 365

b2ap3_thumbnail_office_365_multi_factor_400.jpgHackers are growing bolder by the day, taking on huge organizations like the IRS and Sony Entertainment, and forcing businesses to stay on the defensive at all times. In spite of this, what can the average small business do to keep themselves safe? For starters, you can integrate multi-factor authentication, a solution designed to make it extra difficult for hackers to access online accounts.

Better yet, it’s super easy to setup multi-factor authentication of your Office 365 account, and all accounts associated with your company. Follow these steps and you’ll be done before you know it.

First, you’ll want to log into the Office 365 Portal with your administrator credentials. Then, click on the users and groups tab.

From here, go to the Setup link, located to the right of Set Multi-factor authentication requirements.

This will show a display featuring all of the usernames associated with your Office 365 account. Select the box to the left of the user that you’ll be applying multi-factor authentication to. Then, go to the information box to the right of the user and select Enable, located under quick steps.

A box should open called About enabling multi-factor auth. Make sure you check out these links if you need more information concerning multi-factor authentication. When you’re ready to proceed, all you have to do is click enable multi-factor auth.

ib auth 1Office 365 will inform you that your settings have been applied. You can click close to end the process.

Now that you’ve finished the setup process for multi-factor authentication in the administrator settings, users will be asked to make certain changes to their accounts the next time they log in. After the initial login process, a user will need to verify their identity and set up multi-factor authentication on the user-end.

ib auth 2

The user will be required to select which MFA method they prefer, like their mobile phone number, so they can receive a call or SMS messages from Microsoft. After entering the preferred phone number, click verify.

Next, Microsoft will contact your phone with a unique code that you will enter in order to verify the number. Depending on if you’re using a browser-based MFA setup, you may be asked to change your password too (it’s a best practice to regularly adopt new passwords).

ib auth 3

After creating and implementing a new password, multi-factor authentication will be set up for all the Office 365 accounts that you desire to have an extra layer of protection for.

For more information about multi-factor authentication, and how you can take advantage of similar services for all of your online accounts, give Voyage Technology a call at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 01 April 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Email Google Phishing Workplace Tips Computer Hosted Solutions Users Collaboration IT Services Mobile Device Ransomware Quick Tips Cybersecurity Workplace Strategy Small Business Microsoft Communication Data Backup Passwords Smartphone Backup Saving Money Android Business Management Smartphones VoIP communications Mobile Devices Upgrade Disaster Recovery Browser Managed Service Data Recovery Managed IT Services Social Media Microsoft Office Windows Remote Tech Term Network Internet of Things Facebook Automation Artificial Intelligence Productivity Current Events Covid-19 Cloud Computing Remote Work Miscellaneous Gadgets Server Managed Service Provider Information Holiday Outsourced IT Employee/Employer Relationship Spam Encryption AI Windows 10 Data Management Training Business Continuity Compliance Office Government Wi-Fi Windows 10 Virtualization Business Technology Bandwidth Blockchain Two-factor Authentication Apps Data Security Mobile Office Vendor Gmail Chrome Employer-Employee Relationship Budget Managed Services Voice over Internet Protocol Apple Networking App Mobile Device Management Computing Information Technology Applications WiFi Access Control Office 365 Tip of the week Conferencing Hacker How To BDR Avoiding Downtime Marketing BYOD HIPAA Router Virtual Private Network Risk Management Health Big Data Analytics Office Tips Help Desk IT Support Augmented Reality Retail Storage Password Bring Your Own Device Healthcare Computers Managed IT Services Website Operating System Firewall Solutions Display Printer The Internet of Things Paperless Office Infrastructure Windows 11 2FA Social Monitoring Document Management Excel Remote Workers Customer Service Scam Data loss Telephone Cooperation Free Resource Project Management Going Green Patch Management Windows 7 Save Money Remote Monitoring End of Support Vulnerability Microsoft 365 Vendor Management Cybercrime VPN YouTube Meetings Physical Security Employees Cryptocurrency Integration Safety Computer Repair User Tip Modem Processor Mobile Security Virtual Desktop LiFi Data storage Holidays Data Storage Outlook Smart Technology Supply Chain Machine Learning Video Conferencing Money Managed Services Provider Humor Saving Time Virtual Machines Professional Services Customer Relationship Management Maintenance Antivirus Managed IT Service Sports Mouse Downloads Hacking iPhone Presentation Administration Licensing Entertainment Vulnerabilities Wireless Technology Data Privacy Robot Images 101 Multi-Factor Authentication Mobility Settings Telephone System Wireless Word Cost Management Printing Content Filtering IT Management Public Speaking Network Congestion Directions Videos Assessment Electronic Health Records Permissions Workforce Wasting Time Threats Lithium-ion battery Knowledge Google Drive User Error Entrepreneur Trend Micro Specifications Security Cameras Workplace Strategies 5G Microchip Internet Exlporer Software as a Service Fraud Meta Point of Sale Managing Costs Amazon Unified Communications Experience Username Google Docs eCommerce Bitcoin Network Management Black Friday SSID Running Cable Tech Support Undo Monitors Database Surveillance Google Wallet Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Media Proxy Server Reviews Cookies Windows 8 Cyber Monday Medical IT Laptop Websites Tactics Development Drones Hotspot Transportation Small Businesses Mirgation Hypervisor Displays Electronic Medical Records Application SharePoint Shopping Nanotechnology Optimization PowerPoint Halloween IBM Writing Addiction Lenovo Language Employer/Employee Relationships Outsourcing Chatbots Navigation Virtual Reality Management PCI DSS Gig Economy Screen Reader Hacks Server Management Distributed Denial of Service Workplace Scary Stories Private Cloud Fun Service Level Agreement Internet Service Provider Superfish Computing Infrastructure Teamwork Hiring/Firing Identity Theft Identity Deep Learning Evernote Paperless Twitter Regulations Compliance Bookmark Smart Tech Memes Co-managed IT Error Competition Education Social Engineering Download Net Neutrality Alerts SQL Server Technology Care History Business Communications Remote Computing Financial Data Browsers Smartwatch Connectivity IT Mobile Computing Break Fix Scams Tablet Search User Upload Procurement Azure Hybrid Work Cyber security Best Practice Multi-Factor Security Tech Human Resources Alert Social Network Telework Dark Data CES IoT Communitications Managed IT Dark Web Cables Buisness File Sharing IT solutions IP Address How To Trends Supply Chain Management Legal Regulations Business Growth Google Calendar Term Google Apps Notifications Customer Resource management FinTech Data Analysis Star Wars IT Assessment Microsoft Excel IT Maintenance Travel Google Maps Cortana Recovery Gamification Flexibility Techology Staff Value Business Intelligence Social Networking Alt Codes Legislation Shortcuts Hard Drives Organization Fileless Malware Digital Security Cameras Smart Devices Ransmoware Downtime Unified Threat Management Domains Hosted Solution Content Remote Working Unified Threat Management Wearable Technology Memory Vendors Health IT Motherboard Data Breach Typing Comparison Google Play Be Proactive Refrigeration

Blog Archive