A class of service in which users may be denied access to one or more of the system features or operating levels.

, , , , , , , ,

Azure Multi-Factor Authenticator App | HowTo | 3 of 3

Azure Multi-Factor Authentication HowTo: In Part One and Part Two we covered step-by-step of how to enable Multi-Factor Authentication in the Admin Panel and enrol users. In Part Three I will cover the additional steps the user is required to take in order to install and verify Multi-Factor Authentication with the Azure Multi-Factor Authenticator App.

, , , , , , ,

Cloud Network Providers | Connect Your Private Network to the Cloud

Organisations are not limited to only a single cloud network providers solution option. Furthermore, they’re not merely able to access valuable cloud resources via the Internet. We advocate a combination of solutions to form a resilient, high-speed, high-availability, hybrid cloud network.

, , , , , , , ,

Office 365 Multi-Factor Authentication | HowTo | 2 of 3

Office 365 Multi-Factor Authentication HowTo: In Part One we covered step-by-step of how to enable Multi-Factor Authentication in the Admin Panel. In Part Two I will cover the additional steps the user is required to take in order to enrol in Multi-Factor Authentication. The user will create two forms of verification and update their account recovery details.

, , , , , , , ,

Exchange Online Multi-Factor Authentication | HowTo | 1 of 3

Exchange Online Multi-Factor Authentication HowTo: We’ve covered the notion of two-factor authentication (2FA) and multi-factor authentication (MFA), especially how you MUST enable it for sensitive accounts. I include all IT users, plus any senior management user within the organisation, such as the MD/CEO as their email is sensitive enough to justify Exchange Online Multi-Factor Authentication.

, , , , , , , , ,

Cyber Security: Office 365 as 802.1X RADIUS Password Authentication

Security is paramount for any business, especially given the rise in cyber attacks, data thefts and major network breaches. I won’t list the major names, as that’s been done, but you can read the Cyber Security Breaches Survey 2016. Much of that research was aimed at larger organisations, even though it’s far easier for enterprise-level companies to secure their resources. But what about the rest of us, Startups, Micro-Businesses and Small to Medium sized organisations?

, , , , , , , , , , , , , , ,

Restrict Access to Office 365 Exchange Online | HowTo | 2 of 2

Part One | Part Two In Part One we learnt: Install and update Windows Server with Active Directory Federation Services version 2.0 (AD FS 2.0) with update Rollup 2, KB2681584. Set-up AD FS for Office 365 for Single Sign-On. To continue . . . Add five claim rules to the Active Directory Claims Provider trust. Use the following procedure to […]

, , , , , , , , , , , , , , ,

Restrict Access to Office 365 Exchange Online: Limiting by Network, IP, Client, Group or Policy | HowTo | 1 of 2

Active Directory Federation Services (AD FS) 2.0 provides a way to configure access restriction policies. Office 365 & Exchange Online customers using Single Sign-On (SSO) who require these policies can now use Client Access Policy rules to restrict access based on the location of the computer or device that is making the request and prevent access […]