Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Set Up Multi-Factor Authentication for Office 365

b2ap3_thumbnail_office_365_multi_factor_400.jpgHackers are growing bolder by the day, taking on huge organizations like the IRS and Sony Entertainment, and forcing businesses to stay on the defensive at all times. In spite of this, what can the average small business do to keep themselves safe? For starters, you can integrate multi-factor authentication, a solution designed to make it extra difficult for hackers to access online accounts.

Better yet, it’s super easy to setup multi-factor authentication of your Office 365 account, and all accounts associated with your company. Follow these steps and you’ll be done before you know it.

First, you’ll want to log into the Office 365 Portal with your administrator credentials. Then, click on the users and groups tab.

From here, go to the Setup link, located to the right of Set Multi-factor authentication requirements.

This will show a display featuring all of the usernames associated with your Office 365 account. Select the box to the left of the user that you’ll be applying multi-factor authentication to. Then, go to the information box to the right of the user and select Enable, located under quick steps.

A box should open called About enabling multi-factor auth. Make sure you check out these links if you need more information concerning multi-factor authentication. When you’re ready to proceed, all you have to do is click enable multi-factor auth.

ib auth 1Office 365 will inform you that your settings have been applied. You can click close to end the process.

Now that you’ve finished the setup process for multi-factor authentication in the administrator settings, users will be asked to make certain changes to their accounts the next time they log in. After the initial login process, a user will need to verify their identity and set up multi-factor authentication on the user-end.

ib auth 2

The user will be required to select which MFA method they prefer, like their mobile phone number, so they can receive a call or SMS messages from Microsoft. After entering the preferred phone number, click verify.

Next, Microsoft will contact your phone with a unique code that you will enter in order to verify the number. Depending on if you’re using a browser-based MFA setup, you may be asked to change your password too (it’s a best practice to regularly adopt new passwords).

ib auth 3

After creating and implementing a new password, multi-factor authentication will be set up for all the Office 365 accounts that you desire to have an extra layer of protection for.

For more information about multi-factor authentication, and how you can take advantage of similar services for all of your online accounts, give Voyage Technology a call at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 13 June 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Privacy Malware Google Email Computer Phishing Workplace Tips IT Services Collaboration Hosted Solutions Users Mobile Device Workplace Strategy Ransomware Small Business Quick Tips Cybersecurity Microsoft Communication Passwords Data Backup Saving Money Smartphone Backup Managed Service Android Business Management Smartphones VoIP Upgrade Mobile Devices communications Disaster Recovery Data Recovery Browser Windows Social Media Managed IT Services Microsoft Office Remote Current Events Tech Term Network Internet of Things Productivity Facebook Artificial Intelligence Automation AI Covid-19 Gadgets Cloud Computing Managed Service Provider Remote Work Miscellaneous Server Outsourced IT Information Holiday Employee/Employer Relationship Spam Training Encryption Compliance Office Windows 10 Data Management Government Business Continuity Blockchain Windows 10 Virtualization Bandwidth Business Technology Wi-Fi Two-factor Authentication Vendor IT Support Data Security Apps Mobile Office Mobile Device Management Gmail Networking Chrome Budget BYOD Employer-Employee Relationship Apple Managed Services Voice over Internet Protocol App Information Technology HIPAA Office 365 How To Applications BDR WiFi Conferencing Access Control Hacker Avoiding Downtime Tip of the week Computing Marketing Risk Management Retail Managed IT Services Router Analytics Office Tips Augmented Reality Big Data Storage Password Help Desk Bring Your Own Device Virtual Private Network Computers Healthcare Health Operating System Website Windows 7 Microsoft 365 Firewall Scam Data loss Solutions The Internet of Things Patch Management Save Money Social Remote Monitoring Windows 11 End of Support Vulnerability Monitoring 2FA Vendor Management Excel Physical Security Display Printer Customer Service Remote Workers Going Green Paperless Office Telephone Infrastructure Cybercrime Free Resource Cooperation Document Management Project Management Images 101 Cryptocurrency Word Telephone System Multi-Factor Authentication Maintenance Mobility Cost Management Antivirus Virtual Desktop Data storage LiFi Safety Employees Outlook Integration Money User Tip Humor Modem Mobile Security Robot Processor Holidays Sports Data Storage Mouse IT Management Supply Chain Smart Technology VPN Meetings Video Conferencing Managed Services Provider Administration Customer Relationship Management Saving Time Virtual Machines Professional Services Computer Repair Managed IT Service Hacking Presentation Downloads iPhone Settings Printing Licensing Wireless Wireless Technology Content Filtering Vulnerabilities Machine Learning Entertainment Data Privacy YouTube IT Maintenance Microsoft Excel Private Cloud Hard Drives Data Analysis IT Assessment Star Wars Server Management Flexibility Gamification Superfish Value Business Intelligence Staff Identity Theft 5G Domains Organization Google Docs Social Networking Unified Communications Shortcuts Legislation Twitter Experience Ransmoware Error Running Cable Refrigeration Digital Security Cameras Fileless Malware Smart Devices Bitcoin Remote Working Content Google Wallet Memory Vendors Wearable Technology Social Engineering Public Speaking Lithium-ion battery Health IT Data Breach Motherboard Be Proactive Comparison Google Play Remote Computing Workforce Permissions Laptop Videos Directions Entrepreneur Electronic Health Records Assessment Windows 8 Drones Wasting Time Threats Tablet Trend Micro Workplace Strategies Specifications Security Cameras Alert Meta Fraud File Sharing Halloween Dark Data Undo Microchip Software as a Service Internet Exlporer Managed IT Username Managing Costs Amazon How To eCommerce Black Friday SSID Notifications Virtual Assistant Outsource IT Travel Scary Stories Surveillance Database Hacks Techology Virtual Machine Environment IT Technicians Google Maps Media Fun Application Reviews Proxy Server Cookies Deep Learning Cyber Monday Medical IT Transportation Small Businesses Hotspot Unified Threat Management Development Tactics Unified Threat Management Hypervisor Displays Mirgation Education IBM Shopping Optimization Nanotechnology PowerPoint Mobile Computing Employer/Employee Relationships Outsourcing Language Network Congestion Addiction PCI DSS Management User Error Chatbots Navigation Search Gig Economy Screen Reader Best Practice Workplace Distributed Denial of Service Internet Service Provider Service Level Agreement Teamwork Hiring/Firing Computing Infrastructure Point of Sale Buisness Competition Regulations Compliance Legal Identity IT solutions Paperless Evernote Co-managed IT Tech Support Bookmark Memes Smart Tech Network Management Business Growth Net Neutrality Download SQL Server Technology Care Alerts Monitors User Financial Data History Business Communications Cortana Scams Break Fix Websites Smartwatch Browsers IT Connectivity Alt Codes Procurement Upload Azure Hybrid Work Downtime Telework Social Network SharePoint Cyber security Hosted Solution Human Resources Multi-Factor Security Tech Electronic Medical Records IP Address Cables Dark Web CES Communitications IoT Typing Supply Chain Management Trends Lenovo Writing Recovery FinTech Customer Resource management Google Drive Regulations Google Apps Google Calendar Term Virtual Reality Knowledge

Blog Archive