Multi-Factor Authentication on Office 365

Multi-Factor Authentication on Office 365


We understand that your focus is to drive business growth and stay ahead of the competition. That’s why our Expertly Managed IT services are curated to streamline your operations, help secure your business, and ensure your technology scales with your ambition. We bring a proactive approach to IT management, offering tailored solutions that keep you connected and protected. With services ranging from real-time monitoring to cutting-edge cybersecurity and disaster recovery planning, we’re here to empower your strategic decisions with our Virtual CIO and co-managed IT support. We stand by a security-first ethos, reinforced by our dedicated helpdesk, ensuring clear assistance in plain English, anytime you need it. We are your partner in building a resilient, efficient, and innovative IT infrastructure, freeing you to focus on what you do best: running your business.

Empower Your Business with Expert IT Support

Unlock efficiency and secure your digital assets with our Expertly Managed IT services—where peace of mind meets innovation.

What is Multi-Factor Authentication?

Multi-Factor Authentication (MFA) or sometimes called two-step verification, is an advanced security layer included that makes it more difficult for hackers to get access and gain control of your account. MFA verifies your identity through a two-step process before granting you access to online applications. You may already be using MFA to protect online services such as your financial institution.

The two verification methods that are usually required to prove your identity are:

  • Information you know (like your username and password)
  • A unique device you have physical access to (like your mobile phone)

When logging in with MFA, you must supply your username/password AND prove that you are in possession of a trusted device (i.e. phone.)

Why MFA?

Data breaches are becoming more prevalent in today’s always-connected world.  It is getting harder to recognize the difference from a legitimate login screen and one that is setup as a phishing scheme to steal your username and password. Using MFA provides an additional layer of protection for your user account. Should someone guess your password or trick you into providing it by posing as a legitimate source, an attacker will still have an additional barrier preventing them access to company data. Only the user of a registered trusted device can lift this barrier, making MFA the preferred security method.

How Does It Work?

Username and password plus mobile app code equals access grantedWith MFA, you will need to provide an additional verification method to prove you have access to a trusted device. When logging into company online resources, you will be required to enter your username and password like normal. Then, you may also need to prove that you have access to a trusted device/phone that you previously registered. Only after completing the additional verification step using your trusted device will you be granted access.

Microsoft Office 365 MFA Sign-in Options

With MFA, you will need to provide an additional verification method to prove you have access to a trusted device. The verification methods available can be any of the following:

  • Click Approve from a mobile notification (preferred)
  • Enter a code received by SMS text message
  • Answer a registered phone number and press #

Keep reading. Instructions for configuring and logging in with each of these methods are detailed below.

First Login After MFA Is Enabled

Log into your account using your username and password by visiting Your first login after MFA has been enabled will require you to setup your additional identity verification methods. To continue click the Set it up now button.

You will need to choose the default method you will use to verify your account. We recommend using the Microsoft Authenticator app on your mobile device that will allow you to simply tap Approve from a mobile notification. In addition to being the most secure method, the Microsoft Authenticator app will also allow you to get the verification code even if the device isn’t connected to a cellular network.

You should set up more than one verification method in case your primary method is unavailable. We also recommend setting up your mobile and office phone numbers as your alternate verification phone in case the Authenticator app is not working.

We recommend using the Microsoft Authenticator app as your default verification option. It is the quickest and easiest way to complete the login process.

Using this method will require that you download and install the Microsoft Authenticator app on your phone, tablet, or smart watch. The app is available for Windows Phone, Android, and iOS.

MFA setup step 1: How should we contact you?

  1. Select Mobile app from the drop-down list.
  2. Select Receive notifications for verification
  3. Click Set up.
    Setup additional security verification for mobile app notifications
  1. On your phone or tablet, open the Authenticator app and add an account.
  2. Specify that you want to add a work or school account. You may need to allow the Authenticator app permission to take pictures and record video. The QR code scanner within the app will then open. If your camera is not working properly, you can select to enter your company information manually.
  3. With your mobile device, scan the QR code displayed on your computer’s screen to register the mobile app.
  4. Tab Finish in the mobile app.  You should now see an item with a 6 digit code displayed.
  5. Click Next to close the set up screen.
  6. Ensure that the text next to the Set up button now displays Mobile app has been configured for notifications and verification codes.
  7. Click Next.

MFA setup step 2: Let’s make sure that we can reach you on your Mobile App device

  1. You will now need to approve a mobile app notification to continue. A notification screen will open on your mobile device asking you to approve your sign in. Select Approve. After a brief moment, the web page should continue to complete the login process.

MFA setup step 3: In case you lose access to the mobile app

At this point, you are prompted to setup additional security verification. This is to prevent you from being locked out if for some reason the Authenticator app is not working properly or you have to replace your phone. Make sure to use your mobile phone number so you can verify your identity wherever you are.

MFA setup step 4: Keep using your existing applications

The mobile registration process creates a default app password for you. Store this password to a safe location in case you need to use it for any applications that are unable to work with multi-factor authentication.

Logging in with the Microsoft Authenticator app

  1. Log in to your Office 365 application or website with your username and password as normal.
  2. The next screen will notify you that a notification has been sent to your mobile device to approve your sign-in.
  3. On your mobile device, a notification will appear in the notification panel from the Microsoft Authenticator app asking you to approve the sign-in. Select Approve.
  4. You have now successfully signed into your account.

If your mobile device with the Microsoft Authenticator app is not available, you can select Sign in another way to choose an alternate verification method.

Logging in with a verification code from the Microsoft Authenticator app

The Microsoft Authenticator app will display a 6-digit verification code that changes every 30 seconds. This is useful when your mobile device does not have a data connection or is unable to receive text messages.

  1. Open the Microsoft Authenticator app on your mobile device.
  2. Enter the current code displayed in the app and click Verify.
  3. If successful the login will complete.

Logging in with phone authentication

Phone authentication can either send an SMS text message or call your phone to complete the sign in verification.  The next screen will notify you that a text or a phone call has been sent to your phone to approve your sign in.

SMS Code Verification.

  1. Log in with your username and password as normal.
  2. The next screen will notify you that a text has been sent to your phone to approve your sign in.
  3. Once you receive the SMS text message on your mobile device, enter the code and click Verify.
  4. If successful the login will complete.

Phone Call Verification.

  1. Log in with your username and password as normal.
  2. The next screen will notify you that a call is being placed to your phone for sign in verification.
  3. Answer the phone when it rings and press # when prompted.
  4. If successful the login will complete.
If you are having issues with mobile device email or Outlook on your computer remove and re-setup the account.

For additional support and assistance, please contact our helpdesk via the life saver icon in your taskbar.

Don’t miss out on all the benefits – subscribe now and take your business to the next level!

  • Get exclusive access to expert insights and tips for leveraging technology to grow your business.
  • Stay up to date on the latest tech trends and advancements that can help you stay ahead of the competition.
  • Join a network of business leaders who are committed to using technology to drive success and innovation.
  • Receive personalized support and guidance from our team of IT experts.
  • Enjoy a more streamlined and secure digital experience with our insider tips and tricks.
Three people in a meeting at a table discussing schedule on their Microsoft laptop

Introducing the New Microsoft Planner (Everything You Need to Know)

Calendars, task lists, and project planning are important business tools. Many people use Microsoft’s apps to power these processes. Including Planner, Microsoft To Do, and Project for the web.These tools help keep processes on track and enable task accountability. But…
boost your miami business with expert it support

Boost Your Miami Business with Expert IT Support

Are you a business owner in Miami, Florida, wondering how to keep your IT infrastructure running smoothly without the hassle and headaches? You’re not alone. Many businesses in Miami struggle to manage their IT needs while focusing on their core…
Free internet of things iot network vector

How to Properly Deploy IoT on a Business Network

The Internet of Things (IoT) is no longer a futuristic concept. It’s rapidly transforming industries and reshaping how businesses operate. IoT is a blanket term to describe smart devices that are internet enabled. One example is smart sensors monitoring production…
Free lock security key vector

Here Are 5 Data Security Trends to Prepare for in 2024

With cyber threats evolving at an alarming pace, staying ahead of the curve is crucial. It’s a must for safeguarding sensitive information. Data security threats are becoming more sophisticated and prevalent. The landscape must change to keep up. In 2024,…