Microsoft 365 and Azure AD tools help secure access to your data and provide confidence that your customer information is safe and secure. These services work with compliance tools such as AIP and DLP to help enforce even further protection.
Unfortunately, it’s not uncommon for users to reuse a single password for more than 1 account putting any data at risk should the details of those accounts fall into the wrong hands.
Multi-Factor Authentication (MFA) works by ensuring users provide two or more methods of authentication before allowing access.
Typically, these methods of authentication are as follows;
Conditional Access allows internal and external users to view files and emails they already have permissions to see but also provides the ability and flexibility to apply additional configured rules which must be met before access is allowed.
For example, a user with a company provided Windows 10 machine may have full access to emails via the Outlook software installed on the device. When the same user is not in the office and using say a personal macOS device, accessing emails via the Outlook client can be blocked, forcing the user to read emails in Outlook on the Web instead. Additionally, functions such as downloading and printing can also be restricted.
With Conditional Access, administrators can safely allow entry to Office 365 services such as Exchange Online, SharePoint Online and Microsoft Teams while applying restrictions if needed.
Policies can be created for numerous scenarios and can be applied to users or devices providing additional security to data when it’s needed most.
Our unbranded Azure MFA User Setup Guide is available to help your users enroll for Azure MFA.
This free downloadable guide can be branded and adapted for your company and includes generic screenshots with company names removed.
For more information on Azure MFA and Conditional Access, see our "Security" article.