SlideShare a Scribd company logo
1 of 12
Multi-Factor Authentication
Setting Up MFA
2
Define and Understand
MFA
Manager Takeaways
OBJECTIVES
FAQ and Other
Questions
What is MFA?
 MFA stands for Multi-Factor Authentication
 It’s an additional layer of security to protect
accounts from malicious parties.
Why MFA?
 Information is a companies biggest asset
 Secures and protection for our accounts
 Stops the spread of malicious/spam emails
internally and externally
When?
 EDSI is enabling MFA on Thursday November 8th
 Users are required to setup MFA starting on Thursday
at 9am
 Every employee should have a calendar invite
– All information presented here are contained within the
invite
Text Message
 Most basic method
 Requires a phone
number with text
message capabilities
 You will receive a text
message when your
account is being used
from a new source and
for other events
Microsoft Authenticator App
 Most secure method
 Requires the download of
an app from the native
App store on your phone
 The app will send a push
notifications to your
phone
Two Ways for MFA
MFA Setup
 To choose which option you want, and to start the
MFA process, go to Office.com
After Setup
 MFA effects Microsoft only the following: Outlook,
Skype & Mobile Email.
 Once setup*, you will be prompted to enter a
password**
*The setup might take some time.
**Some programs want your new MFA (“app”) password,
others want your EDSI password. It will not be explicit, we
recommend trying both.
9
Manager Takeaways
 Prep your team for November 8th
 Urge your teams to log into EDSIyou
and access the MFA Course
 Video and Written Tutorials
 MFA can be setup from any
computer or any mobile device
 Know the side effects of MFA after
setup:
– Outlook/Mobile E-mail won’t connect
Issues, Questions, Concerns
 Website: EDSIsolutions.Zendesk.com
 Email: support@EDSIsolutions.Zendesk.com
11
Discussion
12

More Related Content

What's hot

Computerized grading system ( cgs )
Computerized grading system ( cgs )Computerized grading system ( cgs )
Computerized grading system ( cgs )
Chriselle24
 
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
Majid Hajibaba
 

What's hot (20)

Remote Desktop Services and Virtual Desktop infrastructure in Windows Server ...
Remote Desktop Services and Virtual Desktop infrastructure in Windows Server ...Remote Desktop Services and Virtual Desktop infrastructure in Windows Server ...
Remote Desktop Services and Virtual Desktop infrastructure in Windows Server ...
 
Fundamental Cloud Security
Fundamental Cloud SecurityFundamental Cloud Security
Fundamental Cloud Security
 
TugaIT 2017 Office 365 Multi-factor authentication with Microsoft Azure Activ...
TugaIT 2017 Office 365 Multi-factor authentication with Microsoft Azure Activ...TugaIT 2017 Office 365 Multi-factor authentication with Microsoft Azure Activ...
TugaIT 2017 Office 365 Multi-factor authentication with Microsoft Azure Activ...
 
CompTIA Security+ SY0-601 Domain 2
CompTIA Security+ SY0-601 Domain 2CompTIA Security+ SY0-601 Domain 2
CompTIA Security+ SY0-601 Domain 2
 
Computerized grading system ( cgs )
Computerized grading system ( cgs )Computerized grading system ( cgs )
Computerized grading system ( cgs )
 
University result management system
University result management  systemUniversity result management  system
University result management system
 
Eucalyptus cloud computing
Eucalyptus cloud computingEucalyptus cloud computing
Eucalyptus cloud computing
 
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
 
SMTP Simple Mail Transfer Protocol
SMTP Simple Mail Transfer ProtocolSMTP Simple Mail Transfer Protocol
SMTP Simple Mail Transfer Protocol
 
Postfix
PostfixPostfix
Postfix
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
 
Cloud App Security Customer Presentation.pdf
Cloud App Security Customer Presentation.pdfCloud App Security Customer Presentation.pdf
Cloud App Security Customer Presentation.pdf
 
Hair and Beauty Salon
Hair and Beauty SalonHair and Beauty Salon
Hair and Beauty Salon
 
Kerberos case study
Kerberos case studyKerberos case study
Kerberos case study
 
Kerberos
KerberosKerberos
Kerberos
 
College Department Management System
College Department Management SystemCollege Department Management System
College Department Management System
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
 
school fee management system for defence
school fee management system for defenceschool fee management system for defence
school fee management system for defence
 
Wimax security
Wimax securityWimax security
Wimax security
 
Ssl and tls
Ssl and tlsSsl and tls
Ssl and tls
 

Similar to MFA-Powerpoint.pptx

Two factor authentication presentation mcit
Two factor authentication presentation mcitTwo factor authentication presentation mcit
Two factor authentication presentation mcit
mmubashirkhan
 
Android Based Total Security for System Authentication
Android Based Total Security for System AuthenticationAndroid Based Total Security for System Authentication
Android Based Total Security for System Authentication
IJERA Editor
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor Authentication
Dilip Kr. Jangir
 
Sms activity documentation v5
Sms activity documentation v5Sms activity documentation v5
Sms activity documentation v5
Sjef Van Leeuwen
 

Similar to MFA-Powerpoint.pptx (20)

Guide to MFA
Guide to MFAGuide to MFA
Guide to MFA
 
What, Exactly, is Multi-Factor Authentication, and How To Use It?
What, Exactly, is Multi-Factor Authentication, and How To Use It?What, Exactly, is Multi-Factor Authentication, and How To Use It?
What, Exactly, is Multi-Factor Authentication, and How To Use It?
 
UNIT-3.docx
UNIT-3.docxUNIT-3.docx
UNIT-3.docx
 
A Guide to Multi Factor Authentication
A Guide to Multi Factor AuthenticationA Guide to Multi Factor Authentication
A Guide to Multi Factor Authentication
 
Module 10 e security-en
Module 10 e security-enModule 10 e security-en
Module 10 e security-en
 
How to use microsoft authenticator app
How to use microsoft authenticator appHow to use microsoft authenticator app
How to use microsoft authenticator app
 
Multi Factor Authentication
Multi Factor AuthenticationMulti Factor Authentication
Multi Factor Authentication
 
Two factor authentication presentation mcit
Two factor authentication presentation mcitTwo factor authentication presentation mcit
Two factor authentication presentation mcit
 
Implementing Phishing Resistant Solution
Implementing Phishing Resistant SolutionImplementing Phishing Resistant Solution
Implementing Phishing Resistant Solution
 
Android Based Total Security for System Authentication
Android Based Total Security for System AuthenticationAndroid Based Total Security for System Authentication
Android Based Total Security for System Authentication
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor Authentication
 
Effective multi factor authentication for people soft
Effective multi factor authentication for people softEffective multi factor authentication for people soft
Effective multi factor authentication for people soft
 
How to build a highly secure fin tech application
How to build a highly secure fin tech applicationHow to build a highly secure fin tech application
How to build a highly secure fin tech application
 
SECURITY THE POWER OF MULTI-FACTOR AUTHENTICATION
SECURITY THE POWER OF MULTI-FACTOR AUTHENTICATIONSECURITY THE POWER OF MULTI-FACTOR AUTHENTICATION
SECURITY THE POWER OF MULTI-FACTOR AUTHENTICATION
 
Sms activity documentation v5
Sms activity documentation v5Sms activity documentation v5
Sms activity documentation v5
 
An Insight into Essential Eight’s Multi-Factor Authentication
An Insight into Essential Eight’s Multi-Factor AuthenticationAn Insight into Essential Eight’s Multi-Factor Authentication
An Insight into Essential Eight’s Multi-Factor Authentication
 
An Insight into Essential Eight’s Multi-Factor Authentication
An Insight into Essential Eight’s Multi-Factor AuthenticationAn Insight into Essential Eight’s Multi-Factor Authentication
An Insight into Essential Eight’s Multi-Factor Authentication
 
Security as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor TechnologySecurity as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor Technology
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docx
 
Multi-Factor Authentication In Salesforce
Multi-Factor Authentication In SalesforceMulti-Factor Authentication In Salesforce
Multi-Factor Authentication In Salesforce
 

Recently uploaded

electrical installation and maintenance.
electrical installation and maintenance.electrical installation and maintenance.
electrical installation and maintenance.
benjamincojr
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
MaherOthman7
 
Artificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfArtificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdf
Kira Dess
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
IJECEIAES
 

Recently uploaded (20)

litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
 
electrical installation and maintenance.
electrical installation and maintenance.electrical installation and maintenance.
electrical installation and maintenance.
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
 
engineering chemistry power point presentation
engineering chemistry  power point presentationengineering chemistry  power point presentation
engineering chemistry power point presentation
 
Artificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfArtificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdf
 
Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility Applications
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...
 
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and ToolsMaximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptx
 
Passive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptPassive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.ppt
 
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptxSLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
 
Independent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging StationIndependent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging Station
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
 
Software Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdfSoftware Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdf
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
 
21scheme vtu syllabus of visveraya technological university
21scheme vtu syllabus of visveraya technological university21scheme vtu syllabus of visveraya technological university
21scheme vtu syllabus of visveraya technological university
 
Working Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfWorking Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdf
 

MFA-Powerpoint.pptx

  • 2. Setting Up MFA 2 Define and Understand MFA Manager Takeaways OBJECTIVES FAQ and Other Questions
  • 3. What is MFA?  MFA stands for Multi-Factor Authentication  It’s an additional layer of security to protect accounts from malicious parties.
  • 4. Why MFA?  Information is a companies biggest asset  Secures and protection for our accounts  Stops the spread of malicious/spam emails internally and externally
  • 5. When?  EDSI is enabling MFA on Thursday November 8th  Users are required to setup MFA starting on Thursday at 9am  Every employee should have a calendar invite – All information presented here are contained within the invite
  • 6. Text Message  Most basic method  Requires a phone number with text message capabilities  You will receive a text message when your account is being used from a new source and for other events Microsoft Authenticator App  Most secure method  Requires the download of an app from the native App store on your phone  The app will send a push notifications to your phone Two Ways for MFA
  • 7. MFA Setup  To choose which option you want, and to start the MFA process, go to Office.com
  • 8. After Setup  MFA effects Microsoft only the following: Outlook, Skype & Mobile Email.  Once setup*, you will be prompted to enter a password** *The setup might take some time. **Some programs want your new MFA (“app”) password, others want your EDSI password. It will not be explicit, we recommend trying both.
  • 9. 9 Manager Takeaways  Prep your team for November 8th  Urge your teams to log into EDSIyou and access the MFA Course  Video and Written Tutorials  MFA can be setup from any computer or any mobile device  Know the side effects of MFA after setup: – Outlook/Mobile E-mail won’t connect
  • 10. Issues, Questions, Concerns  Website: EDSIsolutions.Zendesk.com  Email: support@EDSIsolutions.Zendesk.com
  • 12. 12

Editor's Notes

  1. You probably already use this with your personal accounts. Banking or Gmail? When you log into your account form an unknown computer it asks to text you.
  2. Have you recently gotten some strange emails filling up your email in box, this should stop that. Have you maybe accidently clicked opened one of those emails? This will protect you from yourself!
  3. *MFA will be open to setup for a week
  4. Source= computer or application Both of these methods requires activation by using office.com
  5. *The change might be immediate, or it might lag. *Sometimes
  6. Staff do not need to be in the office that day or using that computer.