If you aren’t licensed for and using Conditional Access policies, please do not disable the security defaults feature. Microsoft introduced the defaults for a very good reason, but if you disable it you are turning off many security features and settings.
Hackers are now able to password spray your Exchange Online using IMAP / POP3 etc, among other things, and you may not even notice.
Instead, let’s find a solution to the specific issue and leave our tenant protected.
Here’s how to allow certain things (e.g. Teams meeting room devices and printers) while leaving our tenant secure:
1. Add any external IPs of company locations to Trusted IPs under MFA settings. In most cases you would do this for all company owned office locations.
2. Set Password Reset Registration to No so that new users are not prompted to register.
3. If you need to send SMTP email through Exchange Online (e.g. from a printer), create an account with exchange license to use for sending.
4. Load Cloud Shell from top of the Azure Portal. Connect to Exchange:
5. Create an Authentication Policy:
New-AuthenticationPolicy -Name “Allow Basic Auth SMTP” -AllowBasicAuthSmtp
6. Assign the policy to the user:
Get-User firstname.lastname@example.org | Set-User -AuthenticationPolicy “Allow Basic Auth SMTP”
7. Force policy to apply within 30 minutes:
Set-User email@example.com -STSRefreshTokensValidFrom $([System.DateTime]::UtcNow)
Now your users and devices will be able to connect without MFA requirement from trusted offices, and you can set up Scan to Email functions to use account you created.
Righto – time have a cup of tea and reward yourself for not chopping off a leg to fix an itch! 🤣🤣