Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Set Up Multi-Factor Authentication for Office 365

b2ap3_thumbnail_office_365_multi_factor_400.jpgHackers are growing bolder by the day, taking on huge organizations like the IRS and Sony Entertainment, and forcing businesses to stay on the defensive at all times. In spite of this, what can the average small business do to keep themselves safe? For starters, you can integrate multi-factor authentication, a solution designed to make it extra difficult for hackers to access online accounts.

Better yet, it’s super easy to setup multi-factor authentication of your Office 365 account, and all accounts associated with your company. Follow these steps and you’ll be done before you know it.

First, you’ll want to log into the Office 365 Portal with your administrator credentials. Then, click on the users and groups tab.

From here, go to the Setup link, located to the right of Set Multi-factor authentication requirements.

This will show a display featuring all of the usernames associated with your Office 365 account. Select the box to the left of the user that you’ll be applying multi-factor authentication to. Then, go to the information box to the right of the user and select Enable, located under quick steps.

A box should open called About enabling multi-factor auth. Make sure you check out these links if you need more information concerning multi-factor authentication. When you’re ready to proceed, all you have to do is click enable multi-factor auth.

ib auth 1Office 365 will inform you that your settings have been applied. You can click close to end the process.

Now that you’ve finished the setup process for multi-factor authentication in the administrator settings, users will be asked to make certain changes to their accounts the next time they log in. After the initial login process, a user will need to verify their identity and set up multi-factor authentication on the user-end.

ib auth 2

The user will be required to select which MFA method they prefer, like their mobile phone number, so they can receive a call or SMS messages from Microsoft. After entering the preferred phone number, click verify.

Next, Microsoft will contact your phone with a unique code that you will enter in order to verify the number. Depending on if you’re using a browser-based MFA setup, you may be asked to change your password too (it’s a best practice to regularly adopt new passwords).

ib auth 3

After creating and implementing a new password, multi-factor authentication will be set up for all the Office 365 accounts that you desire to have an extra layer of protection for.

For more information about multi-factor authentication, and how you can take advantage of similar services for all of your online accounts, give Voyage Technology a call at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 31 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Ransomware Managed Service Mobile Device Microsoft Productivity Passwords Quick Tips Saving Money AI Communication Cybersecurity Smartphone Data Backup Data Recovery Disaster Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Information Automation Artificial Intelligence Facebook Miscellaneous Holiday Compliance Cloud Computing Covid-19 Gadgets Training Server Managed Service Provider Outsourced IT Remote Work IT Support Encryption Spam Employee/Employer Relationship Windows 10 Office Data Management Business Continuity Government Wi-Fi Business Technology Windows 10 Bandwidth Blockchain Virtualization Managed Services Two-factor Authentication Mobile Office Data Security Vendor Apps Tip of the week Voice over Internet Protocol Mobile Device Management Chrome Networking Gmail Budget WiFi Apple BYOD App Employer-Employee Relationship Computing Hacker Information Technology Avoiding Downtime Conferencing Marketing Office 365 Managed IT Services How To BDR HIPAA Physical Security Applications Access Control Computers Help Desk Risk Management Website Retail Healthcare Analytics Office Tips Augmented Reality Storage Password Bring Your Own Device 2FA Big Data Router Virtual Private Network Operating System Health Monitoring Document Management Remote Workers Managed IT Service Telephone Scam Data loss Firewall Cooperation Free Resource Project Management Windows 7 Patch Management The Internet of Things Windows 11 Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Social Excel Going Green Display Printer Customer Service Paperless Office Cybercrime Infrastructure Presentation YouTube Data Storage Smart Technology Data Privacy Video Conferencing Cryptocurrency Wireless Technology Machine Learning Managed Services Provider Saving Time Virtual Machines Professional Services Virtual Desktop Data storage LiFi Maintenance Antivirus Word Downloads Outlook iPhone Licensing Money Entertainment Humor Vulnerabilities Images 101 Safety Sports Telephone System Mouse Multi-Factor Authentication Robot Mobility Cost Management Supply Chain Administration IT Management VPN Employees Meetings Integration User Tip Customer Relationship Management Modem Processor Computer Repair Mobile Security Settings Printing Wireless Holidays Content Filtering Hacking Human Resources Websites Mirgation Hypervisor Shopping Google Drive Cables Nanotechnology Optimization User PowerPoint Knowledge SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Management PCI DSS Google Apps Chatbots Navigation 5G Lenovo Gig Economy IP Address Google Docs IT Maintenance Screen Reader Unified Communications Writing Distributed Denial of Service Experience Virtual Reality Computing Infrastructure Teamwork Running Cable Business Intelligence Service Level Agreement Internet Service Provider Bitcoin Server Management Regulations Compliance Google Wallet Shortcuts Private Cloud Identity Evernote Superfish Bookmark Ransmoware Identity Theft Smart Tech Memes Recovery Twitter Alerts SQL Server Laptop Vendors Download Net Neutrality Hard Drives Windows 8 Financial Data Domains Drones Be Proactive Error History Browsers Smartwatch Workforce Connectivity IT Social Engineering Break Fix Remote Computing Azure Halloween Threats Upload Procurement Refrigeration Social Network Telework Public Speaking Workplace Strategies Cyber security Multi-Factor Security Tech CES Lithium-ion battery Meta Tablet IoT Communitications Dark Web Alert Entrepreneur Scary Stories Amazon Trends Supply Chain Management Hacks Managed IT Customer Resource management FinTech File Sharing Regulations Dark Data Google Calendar Term Fun Data Analysis Outsource IT Star Wars IT Assessment Deep Learning How To Microsoft Excel Notifications Staff Value Environment Gamification Flexibility Undo Media Organization Travel Social Networking Education Legislation Techology Fileless Malware Digital Security Cameras Small Businesses Google Maps Smart Devices Wearable Technology Memory Displays Content Remote Working Mobile Computing Health IT Unified Threat Management Motherboard Data Breach Comparison Google Play Search Unified Threat Management Directions Videos Outsourcing Assessment Electronic Health Records Application Best Practice Permissions Wasting Time Buisness IBM Legal Workplace Trend Micro IT solutions Network Congestion Specifications Security Cameras User Error Microchip Hiring/Firing Internet Exlporer Software as a Service Business Growth Fraud Managing Costs Username Paperless Co-managed IT Point of Sale eCommerce Black Friday SSID Cortana Technology Care Database Surveillance Alt Codes Virtual Assistant Competition Business Communications Tech Support IT Technicians Virtual Machine Downtime Network Management Proxy Server Reviews Scams Cookies Hosted Solution Monitors Cyber Monday Medical IT Hybrid Work Tactics Development Typing Hotspot Transportation

Blog Archive