Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Set Up Multi-Factor Authentication for Office 365

b2ap3_thumbnail_office_365_multi_factor_400.jpgHackers are growing bolder by the day, taking on huge organizations like the IRS and Sony Entertainment, and forcing businesses to stay on the defensive at all times. In spite of this, what can the average small business do to keep themselves safe? For starters, you can integrate multi-factor authentication, a solution designed to make it extra difficult for hackers to access online accounts.

Better yet, it’s super easy to setup multi-factor authentication of your Office 365 account, and all accounts associated with your company. Follow these steps and you’ll be done before you know it.

First, you’ll want to log into the Office 365 Portal with your administrator credentials. Then, click on the users and groups tab.

From here, go to the Setup link, located to the right of Set Multi-factor authentication requirements.

This will show a display featuring all of the usernames associated with your Office 365 account. Select the box to the left of the user that you’ll be applying multi-factor authentication to. Then, go to the information box to the right of the user and select Enable, located under quick steps.

A box should open called About enabling multi-factor auth. Make sure you check out these links if you need more information concerning multi-factor authentication. When you’re ready to proceed, all you have to do is click enable multi-factor auth.

ib auth 1Office 365 will inform you that your settings have been applied. You can click close to end the process.

Now that you’ve finished the setup process for multi-factor authentication in the administrator settings, users will be asked to make certain changes to their accounts the next time they log in. After the initial login process, a user will need to verify their identity and set up multi-factor authentication on the user-end.

ib auth 2

The user will be required to select which MFA method they prefer, like their mobile phone number, so they can receive a call or SMS messages from Microsoft. After entering the preferred phone number, click verify.

Next, Microsoft will contact your phone with a unique code that you will enter in order to verify the number. Depending on if you’re using a browser-based MFA setup, you may be asked to change your password too (it’s a best practice to regularly adopt new passwords).

ib auth 3

After creating and implementing a new password, multi-factor authentication will be set up for all the Office 365 accounts that you desire to have an extra layer of protection for.

For more information about multi-factor authentication, and how you can take advantage of similar services for all of your online accounts, give Voyage Technology a call at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 20 September 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Business Productivity Software Innovation Hackers Cloud Network Security User Tips Hardware Efficiency Internet Malware IT Support Privacy Google Computer Phishing Email Workplace Tips IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Quick Tips Small Business Cybersecurity Passwords Backup Saving Money Communication Data Backup Smartphone Managed Service Android Productivity Upgrade Business Management VoIP Smartphones Mobile Devices communications Disaster Recovery Data Recovery Social Media Windows Browser Microsoft Office Managed IT Services AI Network Current Events Remote Tech Term Internet of Things Automation Artificial Intelligence Facebook Cloud Computing Information Covid-19 Holiday Miscellaneous Gadgets Remote Work Server Training Managed Service Provider Outsourced IT Encryption Employee/Employer Relationship Compliance Spam Office Windows 10 Government IT Support Data Management Business Continuity Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Vendor Mobile Office Two-factor Authentication Apps Data Security BYOD Mobile Device Management Tip of the week Gmail Chrome Managed Services Voice over Internet Protocol Budget Apple Networking Employer-Employee Relationship App Hacker HIPAA Computing Avoiding Downtime Applications Information Technology Marketing Access Control Office 365 Conferencing WiFi How To BDR Computers Operating System Router Virtual Private Network Risk Management Website Health 2FA Help Desk Analytics Office Tips Augmented Reality Retail Storage Healthcare Password Bring Your Own Device Big Data Managed IT Services Going Green Patch Management Save Money Microsoft 365 Remote Monitoring Customer Service End of Support Vulnerability Vendor Management Solutions Cybercrime Physical Security Display Printer Windows 11 Paperless Office Infrastructure Monitoring Firewall Excel Document Management Remote Workers The Internet of Things Telephone Scam Data loss Social Cooperation Free Resource Project Management Windows 7 Robot Multi-Factor Authentication Mobility Telephone System Cost Management Settings Wireless Hacking Printing Content Filtering Presentation IT Management VPN YouTube Meetings Employees Wireless Technology Integration Cryptocurrency Modem User Tip Processor Computer Repair Mobile Security Holidays Virtual Desktop LiFi Word Data storage Data Storage Smart Technology Supply Chain Video Conferencing Outlook Managed Services Provider Machine Learning Saving Time Virtual Machines Professional Services Money Humor Safety Managed IT Service Maintenance Downloads Antivirus Sports iPhone Mouse Licensing Administration Entertainment Vulnerabilities Data Privacy Images 101 Customer Relationship Management Social Networking Legislation Shortcuts Travel Organization Google Maps Fileless Malware Digital Security Cameras Cortana Smart Devices Competition Ransmoware Techology Alt Codes Content Remote Working Wearable Technology Memory Vendors Motherboard Data Breach Comparison Google Play Be Proactive Downtime Unified Threat Management Health IT Hosted Solution Directions Videos Assessment Electronic Health Records Permissions Workforce Unified Threat Management User Typing Wasting Time Threats Network Congestion Trend Micro Specifications Security Cameras Workplace Strategies Microchip Knowledge Internet Exlporer Software as a Service Fraud Meta Google Drive User Error Username IP Address Managing Costs Amazon 5G eCommerce Black Friday SSID Point of Sale Unified Communications Experience Database Surveillance Virtual Assistant Outsource IT Google Docs Recovery Media Bitcoin Network Management Running Cable Tech Support IT Technicians Virtual Machine Environment Proxy Server Reviews Monitors Cookies Hard Drives Cyber Monday Medical IT Google Wallet Tactics Development Domains Hotspot Transportation Small Businesses Mirgation Hypervisor Displays Windows 8 Laptop Websites Shopping Nanotechnology Optimization Refrigeration PowerPoint Drones Electronic Medical Records Addiction Public Speaking Language Employer/Employee Relationships Outsourcing SharePoint Chatbots Navigation Halloween Management PCI DSS Lithium-ion battery Gig Economy Writing Screen Reader Distributed Denial of Service Workplace Entrepreneur Lenovo Virtual Reality Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Identity Evernote Paperless Hacks Server Management Scary Stories Private Cloud Regulations Compliance Bookmark Fun Smart Tech Memes Undo Co-managed IT Superfish Identity Theft Deep Learning Twitter Download Net Neutrality Alerts SQL Server Technology Care History Business Communications Error Financial Data Browsers Smartwatch Social Engineering Connectivity IT Break Fix Scams Education Remote Computing Upload Procurement Azure Hybrid Work Cyber security Application Multi-Factor Security Tech Human Resources Mobile Computing Social Network Telework Tablet CES Search IoT Communitications Dark Web Cables Best Practice Alert Trends Supply Chain Management IBM Dark Data Regulations Google Calendar Term Google Apps Managed IT Buisness File Sharing Customer Resource management FinTech IT solutions Data Analysis How To Star Wars IT Assessment Microsoft Excel IT Maintenance Legal Business Growth Notifications Gamification Flexibility Staff Value Business Intelligence

Blog Archive