As you know, the “Basic Authentication” configuration was turned off last month.
Organizations using Exchange Online are now protected from the vulnerabilities of legacy authentication.
However, this closure process will continue On December 31, 2022, with exemptions.
Microsoft says ; Once Basic auth for Outlook, Exchange ActiveSync and Exchange Web Services has been permanently disabled in your tenant, there’s really no reason to keep Autodiscover enabled for Basic auth. So, we’re turning off Autodiscover next.
Starting October 1, Microsoft will begin to randomize tenants and disable basic authentication access for MAPI, RPC, Offline Address Book (OAB), Exchange Web Services (EWS), POP, IMAP, Exchange ActiveSync (EAS), and Remote PowerShell. As you know, SMTP AUTH will not be affected by the changes made.
On the day of the change, Microsoft will notify each tenant through the Service Status Dashboard.
If you’re not ready to make these changes, You can do a One-Time Re-Enablement one last time as decided by Microsoft.
You can use Microsoft’s free Multi-Factor Authentication (MFA) application to further increase the security of your Office 365 users in your organization. Of course, for this, your organization must have minimum Azure AD, Microsoft 365 and Microsoft 365 license types.
If you want to enable MFA for all or some of your users in your organization, you can follow the steps below; Method 1: You can access the MFA area via the console and take action for users. Login to Office 365 Admin Center –> Active Users –> Multi-factor authentication
Method 2: You can do it using Connect-MsolService cmdlet powershell commands. You can use three different methods, “EnablePerUserMFA”, “BulkImportEnable” and “EnableAllUserMFA”.