Manage Office 365 App Password

Manage Office 365 App Password

Introduction to Office 365 App Password An app password is a code that gives an app or device permission to access Office 365. When you are using a non-browser application that does not support modern authentication such as apple native email app or Office 2010 that do not support multi-factor authentication. If you are enabled for Multi-Factor Authentication (MFA) in Office 365 then you will need an App Password for these non-browser applications. For such applications, users won’t be able to

Read more

Office 365 Advanced eDiscovery

The amount of electronic information is exploding, and the information is more complex as it’s coming from number of different sources like email, instant messages, documents, videos etc. Managing ever growing data effectively to meet internal and external compliance requirements is more difficult than ever due to increased volume of data and source. To continue to meet legal, business, and regulatory compliance challenges, businesses must be able to keep and protect important information and quickly find what’s relevant. Preparing for

Read more

Setting up forced TLS in Exchange online

Introduction to TLS TLS is a protocol to ensure privacy between communicating applications and their users on the Internet. When a server and client communicate, TLS ensures that no third party can tamper with message. Setting up forced TLS in Exchange Online requires setting up mail flow connectors. By default, all emails in Office 365 are sent using Opportunistic TLS. When sending using Opportunistic TLS, if a TLS connection cannot be established, it will fall back to a basic connection and

Read more

Setting up Office 365 anti-phishing Policies

Introduction Attacks through email are one of the most common methods used by hackers to gain entry into a network. Phishing is a technique used by hackers to retrieve sensitive information such as a user’s account credentials, financial information or marketing campaign etc. In a phishing attack, hacker contact the user posing as a legitimate sender to target the user into providing sensitive data such as personally identifiable information, banking or credit card details, and passwords. Phishing emails usually contain branding

Read more

Office 365 Threat Management

Introduction Transition of business to a digital workplace to empower end users also raised a lot of concerns related to data security and compliance. Is our information secure? Who has access to organizational data? How do our security and compliance policies translate the way we manage and store data in the cloud? It is not large enterprises organizations that has these questions but a number of small companies are increasingly more interested in finding solutions to problems regarding data that

Read more
1 2 3 23