
SharePoint Server supports the accessibility features of supported browsers. I hope this helps everyone not freak out too much, as I know it was a big relief for me.Because SharePoint Server runs as websites in Internet Information Services (IIS), administrators and users depend on the accessibility features that browsers provide. While yes, if you enabled the policies it would break IMAP and CWM's email connectors, you aren't actually required to enable those policies. You should review the considerations for using app passwords documented here to determine if they can be used in your environment. To address this limitation a feature known as app passwords can be used to ensure the application or device can still authenticate. will be blocked because these protocols do not support MFA. When you enforce MFA legacy authentication use protocols such as IMAP, POP3, SMTP, etc. You have MFA enforced on all accounts.ĭo you have an application or device that does not support the use of MFA when authenticating? The only requirement is that you enforce MFA for each user, including service accounts, in your partner tenant. No, it is not required that you enable the baseline protection policies. Is it a requirement to enable the baseline protection policies? Looking back through all the comments on this, I wanted to bring up something that everyone got stuck on (including me) but MSFT never actually said you had to do.


they have no response other than saying they've escalated my query. I opened a ticket with MPN support pointing out the conflicting policies and how are we supposed to rectify that. To be fair, Microsoft seemed to knee-jerk that reaction too, as they put down the MFA requirement and yet still have a policy recommending you keep 2 global admins that do not have MFA. They should all have third party pen testing with published results, log export options to feed SIEM systems, and should ALL have fail2ban type behavior built-in when failed logins or excessive connections are detected. They all say they have some kind of 2FA and presto, you're magically secure which is total bullshit. None of them really offer any meaningful security options in their products still and getting those improvements in that area seem to be the lowest priority out of everything they work on. Our tooling vendors ALL (not JUST CW) just give lip-service to security. What other ideas do people have to deal with Connectwise and other tools that are about to break? I'm sure it won't be a case of me having to argue with them for days to end up getting nothing. I'm sure our account manager will be in touch to arrange a credit for them failing to keep up with news that was announced months ago.
#MSP ACCOUNTS THAT WORK UPDATE#
For outgoing email we are ok as we already use our own SMTP servers rather than Office 365.įor Cloud Console, it looks like we will just have to manually update our licenses until they fix it. Setup some mailboxes in there for our accounts that need to be synced into connectwise, then just setup forwarding from our actual mailboxes to those, to then be read in. The current plan I have to deal with this, without making us non compilant, is to create a new non-partner tenant. This will then put us in violation with Microsoft, due to Connectwise's incompetance and just kick the can down the road until Microsoft Enforce it. So Connectwise will say its fine you can carry on working as it is and will continue to do nothing.

I suspect what will happen is that Microsoft will say it is only a written requirement on the 1st August and not enforced yet. If they are not significantly along with their development to switch to the Graph API there is no way they will be ready two weeks today. We have several colleagues at the Microsoft conference this week to get the most current answers about their new requirements. What Connectwise should have done months ago when this was announced was add a method of fetching emails via the Graph API and move everything over to the new secure app model. As part of this Connectwise Manage's email fetch will break as it uses IMAP, along with pretty much everything else they have that talks to Office 365. Just incase you were unaware in two weeks when the new MFA requirements come into force for CSPs things which use legacy authentication methods such as IMAP will stop working.
