How to enable modern authentication for Office 2013

Recently, Microsoft has removed the basic authentication for all its Microsoft 365 services. Basic authentication is turned off for Exchange Online mailboxes on Microsoft 365 which means that if Outlook 2013 is not configured to use modern authentication, it loses the ability to connect.

To enable modern authentication for Office 2013, a Windows Registry setting must be implemented. This can be achieved manually by adding the following key:

The EnableADAL registry key referenced earlier must be created (Reg_DWORD) and set to 1:

HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Common\Identity\EnableADAL = 1

A quicker way is by adding these code into a notepad, and save the file with the file extension .reg instead of .txt   :

Windows Registry Editor Version 5.00

[HKEY_CURRENT_USER\Software\Microsoft\Exchange]
“AlwaysUseMSOAuthForAutoDiscover”=dword:00000001

[HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Common]

[HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Common\Identity]
“EnableADAL”=dword:00000001
“Version”=dword:00000001

Alternatively, you can download it here – https://sotonproduction.service-now.com/sys_attachment.do?sys_id=7f85cd17dbbec4d4bc72b29f299619f3

For more info on this, you can find out more at https://learn.microsoft.com/en-us/microsoft-365/admin/security-and-compliance/enable-modern-authentication?view=o365-worldwide 

Another one is here – https://knowledgenow.soton.ac.uk/Articles/KB0059904

Monitor your network

Last week Raiqal kept complaining of slow loading when entering his Roblox account. At first glance, I thought it was probably due to issues at the Roblox servers. Then I noticed same thing also happened when loading into Netflix on the TV. I did a few quick speedtest and results were fine.

Wondering what went wrong, I did some troubleshooting and monitoring on the home network for the first time. The major setup was relocating the AP router to a new, open space.

For monitoring purpose, again for the first time, I went into the router. Here is where you can see some details of what is going on in your network. You will be able to see the devices connected to your AP and router, you can see how much data the devices are using, and few other more. For a more complete details, I would recommend you to use a firewall, which can give you a more specific details such as visited website, downloaded files, etc. And if you find any suspicious device connected to the network, you can simply disconnect or ban them from entering the network again.

For additional, I will also use a third party software to do the network monitoring. One of my favorite is Capsa. It provides users with great experience to learn how to monitor network activities, pinpoint network problems, enhance network security. Another good monitoring software is Wireshark

In Windows, there is also a built-in application where we can use to see what is using your network through your computer. It is called Network Statistic, or most known as netstat. It is a command to evaluate all the network comings and goings on your system. For example, the command netstat -o will listing every active network connection on your computer, which port they’re listening on, the external address, and which process the network connection belongs to. Scan through the list and see if there are any unusual entries. You can copy and paste an address into your browser to search for it. The vast majority of entries are for servers or cloud servers of one kind or another because they’re the backbone of the internet. For a quick analysis, head to urlscan.io and pop the address in there. You get a short report on who the server or address belongs to. You can also note the PID (Process ID). Open your Task Manager, then the Services tab, and locate the equivalent process. If the PID has a lot of open network connections in the Command Prompt, and it is a service you don’t recognize, you can either stop the service and see if it clears your bandwidth issues or complete an internet search to figure out what the process is and if it’s something your system requires.

Another built-in application that I always use for a quick troubleshoot is the Resource Monitor. The Resource Monitor is a handy diagnostic tool you can use to check out what’s going on in your computer – the network, CPU, RAM and hard disk.

Good luck!

 

Signs of a Phishing Scam

Few signs you are receiving phishing email

An Unusual Sender Address – A clear red flag, a key indicator of a phishing scam.

Multiple In-Text Errors – Another clear red flag. It is rare to receive an emails from a trusted party that’s littered with mistakes. Spelling and grammatical errors can provide very clear signs of a phishing scam

“Urgent” Messages – If you ever receive an email that stresses high urgency, don’t panic. Check the email for suspicious signs first and then act if you feel the sender is to be trusted.

Unusual Attachments – Typically, attachments will come in the form of .pdf, .jpg, .csv, .bmp, .doc, and .docx. If you ever receive an attachment that falls under the file types .exe, .vbs, .wsf, .cpl, or .cmd, proceed with caution. Such file types are often used by attackers to infiltrate your device.

Provided Links – To avoid clicking on malicious links, run any given link through a link-checking website. These sites will scan the link you provide to determine whether it’s safe or not to access. If the website deems the link malicious, steer clear, and block the sender who provided you with it.

Few other provider that you can check these links are :

Norton Safe Web
ScanURL
PhishTank
Google Transparency Report
VirusTotal
PSafe dfndr lab
URLVoid

Sensitive Information Is Requested – So, if you ever receive an email requesting any kind of sensitive information, take a pause to run some checks. Check the provided links, the attachments, the sender address, and other factors before even considering providing your sensitive information, as once the attacker has this, they can potentially cause a lot of damage.