Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Set Up Multi-Factor Authentication for Office 365

b2ap3_thumbnail_office_365_multi_factor_400.jpgHackers are growing bolder by the day, taking on huge organizations like the IRS and Sony Entertainment, and forcing businesses to stay on the defensive at all times. In spite of this, what can the average small business do to keep themselves safe? For starters, you can integrate multi-factor authentication, a solution designed to make it extra difficult for hackers to access online accounts.

Better yet, it’s super easy to setup multi-factor authentication of your Office 365 account, and all accounts associated with your company. Follow these steps and you’ll be done before you know it.

First, you’ll want to log into the Office 365 Portal with your administrator credentials. Then, click on the users and groups tab.

From here, go to the Setup link, located to the right of Set Multi-factor authentication requirements.

This will show a display featuring all of the usernames associated with your Office 365 account. Select the box to the left of the user that you’ll be applying multi-factor authentication to. Then, go to the information box to the right of the user and select Enable, located under quick steps.

A box should open called About enabling multi-factor auth. Make sure you check out these links if you need more information concerning multi-factor authentication. When you’re ready to proceed, all you have to do is click enable multi-factor auth.

ib auth 1Office 365 will inform you that your settings have been applied. You can click close to end the process.

Now that you’ve finished the setup process for multi-factor authentication in the administrator settings, users will be asked to make certain changes to their accounts the next time they log in. After the initial login process, a user will need to verify their identity and set up multi-factor authentication on the user-end.

ib auth 2

The user will be required to select which MFA method they prefer, like their mobile phone number, so they can receive a call or SMS messages from Microsoft. After entering the preferred phone number, click verify.

Next, Microsoft will contact your phone with a unique code that you will enter in order to verify the number. Depending on if you’re using a browser-based MFA setup, you may be asked to change your password too (it’s a best practice to regularly adopt new passwords).

ib auth 3

After creating and implementing a new password, multi-factor authentication will be set up for all the Office 365 accounts that you desire to have an extra layer of protection for.

For more information about multi-factor authentication, and how you can take advantage of similar services for all of your online accounts, give Voyage Technology a call at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 13 December 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Backup Quick Tips Passwords Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade Smartphones AI Data Recovery VoIP Business Management Mobile Devices communications Disaster Recovery Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Miscellaneous Information Automation Artificial Intelligence Facebook Gadgets Cloud Computing Holiday Training Covid-19 Remote Work Server Managed Service Provider Outsourced IT Compliance Encryption Spam IT Support Employee/Employer Relationship Office Windows 10 Government Business Continuity Data Management Blockchain Wi-Fi Business Technology Bandwidth Windows 10 Virtualization Apps Vendor Two-factor Authentication Mobile Office Data Security Employer-Employee Relationship BYOD Tip of the week Chrome Mobile Device Management Budget Gmail Managed Services Apple Networking Voice over Internet Protocol App HIPAA Computing Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing How To WiFi BDR Operating System Router Risk Management Virtual Private Network Computers Health Help Desk Analytics Office Tips Website Augmented Reality 2FA Retail Storage Password Bring Your Own Device Managed IT Services Healthcare Big Data Social Going Green Patch Management Save Money Free Resource Remote Monitoring End of Support Project Management Vulnerability Vendor Management Windows 7 Cybercrime Physical Security Microsoft 365 Customer Service Display Printer Solutions Paperless Office Infrastructure Monitoring Document Management Windows 11 Firewall Excel Telephone Scam Data loss Remote Workers Cooperation The Internet of Things Robot Telephone System Cost Management Vulnerabilities Data Privacy Settings Wireless Printing Images 101 Content Filtering Customer Relationship Management IT Management YouTube Meetings Multi-Factor Authentication Mobility VPN Cryptocurrency Modem Hacking User Tip Processor Computer Repair Mobile Security Presentation Virtual Desktop Employees Data storage LiFi Wireless Technology Integration Smart Technology Outlook Machine Learning Holidays Money Saving Time Word Humor Data Storage Managed IT Service Supply Chain Maintenance Video Conferencing Downloads Managed Services Provider Antivirus Sports Virtual Machines Professional Services Mouse Licensing Safety Entertainment Administration iPhone Travel Social Networking Telework Legislation Cyber security Application Tech Human Resources Techology Fileless Malware Google Maps CES Cortana Communitications Cables IBM Alt Codes Content Wearable Technology Supply Chain Management Downtime Unified Threat Management Motherboard FinTech Comparison Term Google Apps Health IT Unified Threat Management Directions Hosted Solution Assessment Permissions IT Assessment IT Maintenance Value Business Intelligence Typing Flexibility Organization Network Congestion Specifications Shortcuts Google Drive User Error Microchip Internet Exlporer Digital Security Cameras Knowledge Fraud Smart Devices Competition Ransmoware Memory Vendors Username Remote Working Point of Sale 5G Black Friday Data Breach Google Play Be Proactive Google Docs Unified Communications Database Videos Experience Electronic Health Records Workforce Wasting Time Threats User Bitcoin Network Management Running Cable Tech Support IT Technicians Cookies Monitors Cyber Monday Trend Micro Security Cameras Workplace Strategies Google Wallet Proxy Server Tactics Hotspot Software as a Service Meta IP Address Managing Costs Amazon Windows 8 Laptop Websites Mirgation Nanotechnology eCommerce SSID Drones SharePoint Addiction Electronic Medical Records Language Surveillance Virtual Assistant Outsource IT Virtual Machine Environment Recovery Media Management Halloween Chatbots Screen Reader Reviews Writing Distributed Denial of Service Hard Drives Medical IT Lenovo Service Level Agreement Virtual Reality Computing Infrastructure Development Domains Transportation Small Businesses Hypervisor Displays Hacks Server Management Scary Stories Private Cloud Identity Identity Theft Smart Tech Shopping Fun Optimization Refrigeration PowerPoint Superfish Bookmark Deep Learning Download Twitter Alerts Public Speaking Employer/Employee Relationships Outsourcing Lithium-ion battery Navigation Error PCI DSS Education Connectivity Gig Economy Social Engineering Break Fix Workplace Entrepreneur Browsers Upload Remote Computing Internet Service Provider Teamwork Hiring/Firing Multi-Factor Security Evernote Paperless Mobile Computing Social Network Regulations Compliance Tablet IoT Search Dark Web Memes Undo Co-managed IT Best Practice Trends Alert Net Neutrality SQL Server Technology Care Buisness File Sharing Regulations Financial Data Dark Data Google Calendar History Business Communications Managed IT Customer Resource management Legal Data Analysis IT solutions Star Wars Smartwatch How To Microsoft Excel IT Scams Azure Hybrid Work Business Growth Gamification Notifications Staff Procurement

Blog Archive