Category: Tips

How to change MFA Phone Number for Microsoft 365 Account

As technology continues to advance and security threats become more prevalent, it is important to take proactive measures to protect your online accounts. One of the most effective ways to secure your Microsoft 365 account is by setting up Multi-Factor Authentication (MFA). MFA adds an extra layer of security by requiring you to provide an additional form of verification, such as a code sent to your phone, when logging into your account. 

  

However, in some instances, you may need to change the MFA phone number associated with your Microsoft 365 account. This could be due to a change in your personal phone number or switching to a new device. Whatever the reason may be, it is a simple process to update your MFA phone number and ensure the security of your account. Don’t have MFA enabled yet? Scroll to the bottom of this tutorial for the guide which explains how to set it up for an extra layer of protection!

  

Before we dive into the steps, ensure that you have admin access to the Azure portal. Additionally, you should know the user whose MFA details will be updated. This information is crucial to ensure that the changes are made to the correct account. 

 

Now, let’s take a look at the steps for changing your MFA phone number for your Microsoft 365 account: 

  

Steps to Change the MFA Phone Number:
STEP #1: Sign in to the Azure Portal · Go to https://portal.azure.com.
  1. Sign in with an account that has the necessary admin permissions.
STEP #2: Navigate to Azure Active Directory
  1. In the left-hand navigation pane, select Azure Active Directory.
 STEP #3: Find the User
  1. Under Manage, select Users.

  2. Use the search bar to find the specific user whose MFA phone number you need to change.

  3. Click on the user’s name to open their profile.

 STEP #4: Manage User Settings
  1. In the user profile, under Manage, click on Authentication methods.

STEP #5: Update the Phone Number
  1. If the user has an existing phone number configured, you will see it listed.

  2. Click on the Edit icon (a pencil) next to the phone number.

  3. Update the phone number to the new desired number.

  4. Click Save.

STEP #6:  Notify the User
  1. Inform the user that their MFA phone number has been updated.

  2. The user should verify that the new phone number works for MFA by attempting to sign in.

Additional Considerations: 

  

  • Backup Methods: Ensure that users have backup MFA methods configured, such as an alternate phone number or an authenticator app, to avoid being locked out.
  • Policy Compliance: Verify that the change complies with your organization’s security policies.

It is important to note that you should have at least two methods of verification set up. This could be a phone number and an email address, or even two phone numbers. With multiple methods, you can ensure that you always have a way to verify your identity and access your account. 

But be mindful that changing the MFA phone number for a Microsoft 365 account will not disable MFA. The user will still be required to provide the additional factor for authentication. 

 In conclusion, with the rise in cyber threats, it is essential to secure your Microsoft 365 account with MFA. By following the simple steps outlined in this blog post, you can easily change the MFA phone number for a user account in your organization. It is recommended to regularly review and update MFA details to ensure the security of user accounts. 

Don’t have MFA enabled yet? Follow this simple guide below that explains how to set it up for an extra layer of protection!

Your Guide to Mastering Email Forwarding

Have you ever experienced the overwhelming feeling of having your inbox flooded with messages, posing a threat to your productivity? Rest assured, because you are not alone. Effectively managing emails can be quite challenging. However, busy professionals need not worry! There exists a potent tool hidden within your email settings: email forwarding.

Beyond its simple definition, email forwarding offers a surprising depth of functionality, capable of streamlining your workflow, enhancing collaboration, and ensuring important information reaches the right people, every time.

Intrigued? Follow us as we dive deeper into this tutorial of email forwarding. We’ll explore its various applications, from basic message redirection to advanced filtering and automation, all designed to help you. 

Step #1: Exchange Admin Center

First you need to go to Exchange Admin Center (https://admin.exchange.microsoft.com).

 

Step #2: Create Rules

Then expand “Mail Flow” and select “Rules”.

Under Rules, click on “Add a rule” and then “Create a New Rule”.

 
Your Guide to Mastering Email Forwarding

Step #3: Setting up Conditions for Email Transportation

This is an important step. First, we Define Forwarding Conditions:

  • Give your rule a clear and descriptive name (e.g., “Arif to Dawood”).
  • Under “Apply this Rule if” choose “The recipient is.”
  • Under “is this person”, select one.
  • Then, under “Do the following” 
  • Select “Redirect the message to”  
  • Then select “These recipient”
Your Guide to Mastering Email Forwarding

After filling out the fields your rule will look like.

Now click on “Next” button.

 

Your Guide to Mastering Email Forwarding

Step #4: Set Rule Settings

  • Under “Set rule settings”.
  • You can select the Activation and Deactivation time for your rule.
  • After setting up click on “Next” button.
Your Guide to Mastering Email Forwarding

Step #5: Review and Finish

  • Under “Review and Finish”.
  • Review all your configuration and then click finish.
Your Guide to Mastering Email Forwarding

Step #6: Enable Rule

When you create new rule by default it is in disabled state.

You must click on your rule and then enable it manually.

 

Your Guide to Mastering Email Forwarding

And that’s it! Stay tuned as we explore different forwarding techniques, best practices, and insider tips to help you achieve the full potential of this powerful tool. Remember, conquering your inbox starts with one forward at a time!

 

Stay tuned for further insights and tips on email forwarding in the upcoming posts!

IT Assessments, The Best Insurance Against Downtime

With the evolving technology landscape businesses now heavily rely on their IT systems, for day to day operations. These systems play a role in managing data and facilitating customer communications making their optimal performance essential for success. However many businesses tend to overlook the significance of IT assessments. In this blog post we will explore the importance of conducting IT assessments and how they can be the best insurance against downtime.

Why IT Assessments Matter

To begin with regular IT assessments help businesses uncover any underlying issues or vulnerabilities within their systems. As technology continues to advance at a pace cyber threats also evolve simultaneously. It is therefore imperative to stay updated and ensure security measures are in place. Regular assessments enable you to pinpoint points in your IT infrastructure and promptly address risks. This proactive approach aids in preventing data breaches, downtime disruptions and other costly consequences that may arise if these issues are left unattended.

Proactive Security for Peace of Mind

Moreover IT assessments contribute to optimizing the performance and efficiency of your systems. As your business grows and evolves over time so do your IT requirements. Regular assessments play a role, in identifying areas where enhancements can be made. Whether it involves updating hardware or software components or integrating technologies into your operations.

 

Optimizing Your IT Infrastructure

By optimizing your information technology systems you have the opportunity to enhance productivity and streamline operations, which ultimately results in saving costs and achieving performance.

 

Avoid Costly Surprises with Proactive IT Management

Regular IT assessments offer numerous benefits for businesses, including the ability to plan for the future. By conducting these assessments, businesses can gain valuable insights into their current IT infrastructure and make necessary upgrades or changes in advance. This proactive approach saves time and resources in the long run, eliminating the need for reactive measures that often come with higher costs and operational impact.

 

Get the Most Out of Your Investment

Additionally, regular IT assessments provide businesses with a better understanding of their IT budget. By identifying potential risks and areas for improvement, businesses can effectively plan and allocate their IT budget. This approach prevents overspending on unnecessary upgrades or emergency fixes.

 

Happy Customers, Happy Business

Furthermore, conducting regular IT assessments improves customer satisfaction. In today’s digitally driven world, downtime and technical issues significantly impact customer experience. By regularly assessing and optimizing IT systems, businesses ensure smooth operations and minimal interruptions, leading to improved customer satisfaction and loyalty.

 

Ensuring Data Security and Privacy

Lastly, IT assessments help businesses stay compliant with industry regulations and laws. Industries like healthcare and finance have strict data privacy and security regulations that businesses must adhere to. Regular assessments ensure that IT systems are up to date with these regulations, avoiding potential penalties or legal consequences.

 

Choose Security, Choose ITCS

In conclusion, regular IT assessments are crucial for maintaining optimal performance, efficiency, and security within organizations. They allow businesses to proactively identify risks, optimize systems, plan for the future, stay compliant, and improve customer satisfaction. Therefore, it is important not to overlook the significance of IT assessments and the significant benefits they provide for businesses.

ITCS is your premiere partner for all of your IT needs, ready to guide you through every step of the journey.

5 Cloud Myths That Are Holding You Back

As cloud solutions grow increasingly popular, misconceptions about them proliferate. Many businesses and individuals harbor reservations, often stemming from misinformation or misunderstandings. However, misconceptions can prevent organizations and people from capitalizing on the many benefits of cloud solutions. This article debunks common myths about cloud solutions.

Myth #1: Cloud solutions only benefit large enterprises

In fact, cloud solutions offer advantages for organizations of all sizes, from startups to corporations. Cloud solutions provide cost savings by eliminating expensive hardware and IT staff. Moreover, they scale to accommodate business growth. Therefore, cloud solutions suit businesses of any size.

 

Myth #2: Cloud solutions are insecure.

While data breaches are a valid concern, cloud solutions offer robust security. Providers invest heavily in encryption, firewalls, and regular updates. Most offer advanced features like multi-factor authentication and backup. Thus, cloud solutions are as secure as on-premise systems, if not more.

 

Myth #3: Migrating to the cloud is difficult

While initial setup is required, cloud solutions aim for user-friendly, smooth migration. Providers offer extensive support throughout the transition. Once complete, intuitive interfaces simplify data and application management. Hence, migration is straightforward with provider assistance.

 

Myth #4: Cloud solutions are costly

In reality, cloud solutions offer long-term savings by eliminating hardware, software, and IT staff expenses. Subscription-based pricing allows paying only for needed services and scaling accordingly. Therefore, cloud solutions provide cost-effective flexibility.

 

Myth #5: Cloud solutions lack reliability.

Leading providers offer strong uptime guarantees and backup systems for downtime. Because cloud solutions work anywhere with Internet access, business operations continue despite location issues. Thus, cloud solutions deliver proven reliability.

 

Choose Security, Choose ITCS

In summary, cloud solutions benefit organizations of all types and sizes. They provide security, savings, and resilience while being easy to adopt. It is time to dispel misconceptions and unlock the many advantages of cloud solutions.

 

Cloud solutions offer cost savings, security, and flexibility that can propel your business to new heights. It’s time to stop living in the IT stone age and step into the cloud. You might just find it’s the missing piece that unlocks your business’s true potential.

Don’t let outdated myths hold you back from experiencing the power and flexibility of cloud solutions. ITCS is your premiere partner for all things cloud, ready to guide you through every step of the journey.

Stop cyberattacks before they happen with Barracuda!

In today’s digital era, safeguarding your business from cyber threats is of utmost importance. With the constant evolution of cyber attacks, it is crucial to have a reliable cybersecurity solution in place. This is where Barracuda excels – as the leading choice for businesses seeking top-notch cybersecurity. 

Barracuda is a renowned provider of cloud-enabled security and data protection solutions. With a vast customer base of over 150,000 worldwide, their cutting-edge technology and comprehensive approach to cybersecurity have earned them a solid reputation in the industry.

Let’s delve deeper into why Barracuda should be your ultimate choice for all your cybersecurity needs. 

 

Advanced Threat Protection 

The internet is a breeding ground for cybercriminals who continuously devise new and sophisticated methods to breach security defenses. This is where Barracuda’s Advanced Threat Protection (ATP) comes into play. 

This powerful solution enables businesses to stay one step ahead of potential threats by constantly monitoring and analyzing inbound and outbound traffic. By utilizing machine learning techniques, it can detect and block advanced threats in real-time, ensuring the safety of your systems and data. 
 

Simple and Scalable Solutions

One of the biggest challenges businesses face in cybersecurity is finding a solution that is both effective and easy to manage. Barracuda addresses this challenge by offering simple and scalable solutions that can be tailored to meet the specific needs of any business. 

Their user-friendly interface and intuitive dashboard make it effortless for businesses to manage their security and data protection, even with limited IT resources. 
 

Cloud-First Approach 

In today’s era of cloud computing, it is essential for businesses to adopt a cloud-first approach to their cybersecurity needs. Barracuda offers a wide range of cloud-enabled solutions designed to protect data and applications in the cloud. Their user-friendly interface and intuitive dashboard make it effortless for businesses to manage their security and data protection, even with limited IT resources. 

 
From email security to backup and disaster recovery, their cloud-first approach ensures that your business remains secure and resilient in the face of evolving cyber threats.
 
 In conclusion, Barracuda stands out as the go-to choice for businesses seeking robust cybersecurity solutions. With their advanced threat protection, simple and scalable solutions, and cloud-first approach, they provide the necessary tools and expertise to safeguard your valuable data and systems. Trust Barracuda to be your partner in the ever-changing landscape of cybersecurity. 
 

Choose Security, Choose ITCS

Is your data safe from the ever-evolving landscape of cyber threats? Don’t let your business become the next victim. ITCS partners with Barracuda, the world’s leading cybersecurity provider, to offer comprehensive protection against viruses, malware, ransomware, and more.  

Get a customized quote that fits your budget and protects your valuable assets. Contact us today to protect your business from cyberattacks and secure it for the future!

Exporting Mailbox Data to PST Files in Microsoft 365

In the present era of global connectivity, it is inevitable to create a digital trail consisting of emails, contacts, and calendar entries. However, what if you find yourself needing to transition to a different platform or safeguard important data from your Microsoft 365 mailbox?  

If you have accumulated years of emails, contacts, and calendar entries in your Microsoft 365 mailbox, it is important to preserve that data for future reference. However, you shouldn’t have to rely solely on a cloud account to access it.

That’s where PST files come in – they serve as personal storage containers for your needs.

PST files play a crucial role as personal storage containers to cater to your requirements. In this guide, we will delve into a vital technique to export your Microsoft 365 mailbox to a PST file.

Gain complete control and uninterrupted access to your valuable information by taking this step. Regardless of any changes in your subscription, you will always have the power to manage and retrieve your data.

But Why Export?

There are multiple justifications for exporting your Microsoft 365 mailbox, which may include:

Archiving: Preserve previous emails for sentimental purposes or legal requirements, regardless of your current account status.

Migration: Transfer your data to a different email platform or local backup.  

Downsizing: Free up space in your online mailbox for better performance.

In this guide, we will provide a comprehensive explanation of one of the techniques available for exporting your mailbox data into PST files. This method involves leveraging the Content Search option within the system of M365 Admin Centre. 

By Using Content Search

Step ONE: Sign in to Microsoft 365 Admin Center

Step TWO: Access the Security & Compliance Center

  • In the Microsoft 365 Admin Center, select “Admin centers” from the left-hand navigation menu. 
  • Choose “Security & Compliance” from the list of admin centers.

Step THREE: Create a New Content Search

  • In the Security & Compliance Center, go to “Search” on the left-hand navigation pane. 
  • Click on “Content search.” 

Step Four: Create a New Content Search Query

  • Click the “+ New search” button to create a new content search.
  • Provide a name and description for the search. 
screenshot-1

Step FIVE: Define Search Criteria:

  • Click on “Add conditions” to define your search criteria. You have the ability to define specific criteria such as keywords, date ranges, and sender/recipient information.

Step SIX: Configure the Output Settings

  • After defining your search criteria, click “Next” to configure the output settings. 
  • Choose “Modify the search query” and select the “Include all items” option. 

Step SEVEN: Specify the Mailboxes to Export

  • Click “Next” to specify the mailboxes from which you want to export data. 
  • You can select specific mailboxes or apply the search to all mailboxes. 

Step EIGHT: Choose the Export Settings

  • Click “Next” to configure export settings. 
  • Choose “Export to a PST file.” 
  • Specify a location to store the exported PST files. 

Step NINE: Start the Export

  • Click “Next” to review your settings. 
  • Click “Save & run” to start the export process. 
screenshot-3

Step TEN: Monitor the Export Job

  • You can monitor the status of the export job from the “Content search” page in the Security & Compliance Center. 
  • Once the export is complete, you can download the PST files from the specified location. 

Gaining access through eDiscovery

Sometimes, a user does not have access to make PST Files. In situations where a user lacks permission to create PST files, we can leverage eDiscovery to grant access. Follow these steps:

 

Step ONE: Sign in to Microsoft 365 Admin Center

  • Sign into Microsoft 365 Admin Center:

  • Go to the Microsoft 365 Admin Center (https://admin.microsoft.com/).

  • Sign in with an account that has the necessary administrative privileges.

Step two: Access Security & Compliance Center

  • In the Admin Center, navigate to the “Admin Centers” section.

  • Click on “Security & Compliance” to access the Security & Compliance Center.

Sc1-1

Step three: Navigate to eDiscovery:

  • In the Security & Compliance Center, go to the “Solutions” section.

  • Click on “eDiscovery” to access the eDiscovery dashboard.

scrennshot2

Step Four: Create a New eDiscovery Case:

  • Click on the “+ Create a case” button to create a new eDiscovery case.

  • Provide a name and description for the case.

scrennshot4

Step Five: Add Members to the eDiscovery Case:

  • In the eDiscovery case settings, add the necessary members who should have permission to access and download the PST file.

scrennshot3

Step Six: Create a New eDiscovery Search:

  • Within the eDiscovery case, click on the “Search” tab.

  • Create a new eDiscovery search by clicking on “New search.”

scrennshot6

Step Seven: Configure Search Criteria:

  • Define the search criteria to identify the mailboxes or content you want to export to a PST file. This may include specifying keywords, date ranges, etc.

scrennshot5

Step Eight: Start the Search:

  • Initiate the search to identify the relevant content.

Step Nine: Start the Search:

  • Once the search is complete, review the search results to ensure they match your criteria.

Step Ten: Export Search Results to a PST File:

  • After reviewing the search results, go to the “Export” tab.

  • Follow the prompts to export the search results to a PST file.

  • Configure Export Settings:

  • Set the export settings, including the destination location for the PST file and any additional options.

 

That’s it! With these simple steps, you can easily export your Microsoft 365 mailbox data and ensure its safekeeping. 

Remember, the best method for you depends on your needs and technical skills. Choose the one that fits your comfort level and get exporting! 

I hope this short guide helps you navigate the world of Microsoft 365 mailbox exports.  

 

Allowing/Blocking Emails or Domains in Microsoft 365

Tired of being swamped by a flood of unwanted emails? Longing for the ability to manage your chaotic inbox?  

It’s completely understandable to feel overwhelmed by the influx of unwanted emails. You’re not alone in this constant battle against spam and irrelevant messages.   

However, there’s no need to worry, as there are effective ways to regain control over your inbox!   

We’ve prepared for you, a comprehensive tutorial that will guide you with the necessary knowledge and tools to curate your email experience, enabling you to embrace the desired emails and eliminate the unwanted ones.  

 

Step ONE: Sign in to Microsoft 365 Admin Center

Step TWO: Access the Exchange Admin Center

  • In the Microsoft 365 Admin Center, select “Admin Centers” from the left-hand navigation menu. 
  • Choose “Exchange” from the list of admin centers. 
sc1

Step THREE: Navigate to Mail Flow Rules

  • In the Exchange Admin Center, go to “mail flow” from the left-hand navigation pane. 
  • Click on “rules.” 

Step FOUR: Create a New Rule (Allow/Block)

  • To allow or block emails from specific senders or domains, you can create a new rule. 
  • Click on the “+” (New) button to create a new rule. 
  • Choose “Create a new rule” from the dropdown. 

Step FIVE: Configure the Rule

  • Give your rule a name that describes its purpose. 
  • Under “Apply this rule if,” you can specify the conditions such as the sender’s address or domain. 
  • Under “Do the following,” select either “Block the message” or “Redirect the message to” and specify the action. 
sc3
sc4

Step SIX: Save the Rule:

  • After configuring the rule, click “Save” to apply it. 
  • This rule will now allow or block emails from the specified sender addresses or domains based on your configuration. 

Now you can experience a world without spammy marketing blasts or annoying notifications that clutter your inbox. Say goodbye to wasting precious time sorting through irrelevant emails.

 

With the power to allow and block, you can create a personalized email sanctuary where only important and desired messages flow freely.