If you've implemented multi-factor authentication, you should disable the default basic authentication to make sure attackers can't exploit it. Credit: RayalHristova / Getty Images / Microsoft Attackers will go after weaker credentials and passwords to gain network access. Small businesses often set up shared mailboxes that are used for various functions. If one set of credentials for a shared mailbox is compromised, it could have a wide impact on the company.If you’ve enabled multi-factor authentication (MFA), you might think that you’ve done enough to ensure you are protected. Unless you disable legacy authentication in your Office 365 implementation, however, you are still at risk. Basic authentication is enabled by default in all Office 365 implementations unless you disable it.First, how do you know if your Office 365 still supports basic authentication? Open Microsoft Outlook and look at the authentication window that pops up to ask you for a password. If it looks like the traditional authentication window you’ve seen for years, basic authentication is still enabled. Susan BradleyTraditional sign-in window means basic authentication is still active(Note: All screenshots were taken in June 2019. Given that Office 365 and Azure are fluid platforms, they might look different when you view them later.) Before you disable basic authentication, review what applications are using it. Many applications rely on basic authentication and are not ready to be restricted to modern authentication. Go to the Azure Portal, into the Azure Active Directory and review the sign ins.Click on “Columns,” add client sign-ins to the view and click “OK”. Review for any applications that log in that use older legacy authentication. Some third-party applications that hook into Office 365 may still use basic authentication. For example, the native iPhone mail application still relies on basic authentication. If you disable basic authentication, you might have to set up an iPhone Exchange mail profile after MFA is enabled. To set it up, remove the iPhone Exchange profile, re-add the user account to set up the profile again, and then select “Sign in when prompted”. You will then get the appropriate modern authentication window to trigger the proper authentication process. Susan BradleyReview sign-in activityTo limit the issues you might face, focus on client applications that use Unsupported Exchange ActiveSync and on the categories of Other clients. Narrow in on IMAP, MAPI, older office clients, POP and SMTP as these older applications will expose your Office 365 and Azure Active directory to password spray attacks. Susan BradleyFilter on older authentication techniquesDisabling unneeded authentication is an easy process. Go to the Microsoft Admin Portal. Select a user, go to mail, and then to “Manage email apps”. Susan BradleyManage email appsDisable any authentication processes that you do not need: In particular focus in on disabling IMAP and POP as these two are targeted in password spray attacks. Susan BradleyDisable unneeded appsObviously, disabling IMAP and POP one mailbox at a time is not a viable methodology. Here’s a PowerShell command to help:Get-Mailbox | Set-CasMailbox -PopEnabled $false -ImapEnabled $falseYou may also be able to disable SMTP, but this may depend on other applications. If you can disable all three, then use this PowerShell command: Get-Mailbox | Set-CasMailbox -PopEnabled $false -ImapEnabled $false-SmtpClientAuthenticationDisabled $trueTo ensure that any new account going forward does not have IMAP and POP enabled by default, you might want to disable the authentication proactively. Use this PowerShell command to disable IMAP and POP on any new accounts:Get-CASMailboxPlan | Set-CASMailboxPlan -ImapEnabled $false -PopEnabled $false Take the time to review if you still need legacy authentication in your Office 365 implementation. If a vendor requires it, ask them what their plans are — or rather were, as they should have been off legacy authentication a long time ago. It’s time to forget the terms IMAP and POP and put them behind us. Related content news FBI probes into Pennsylvanian water utility hack by pro-Iran group Federal and state investigations are underway for the recent pro-Iran hack into a Pennsylvania-based water utility targeting Israel-made equipment. By Shweta Sharma Nov 29, 2023 4 mins Cyberattacks Utilities Industry feature 3 ways to fix old, unsafe code that lingers from open-source and legacy programs Code vulnerability is not only a risk of open-source code, with many legacy systems still in use — whether out of necessity or lack of visibility — the truth is that cybersecurity teams will inevitably need to address the problem. By Maria Korolov Nov 29, 2023 9 mins Security Practices Vulnerabilities Security news Amazon’s AWS Control Tower aims to help secure your data’s borders As digital compliance tasks and data sovereignty rules get ever more complicated, Amazon wants automation to help. By Jon Gold Nov 28, 2023 3 mins Regulation Cloud Security news North Korean hackers mix code from proven malware campaigns to avoid detection Threat actors are combining RustBucket loader with KandyKorn payload to effect an evasive and persistent RAT attack. By Shweta Sharma Nov 28, 2023 3 mins Malware Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe