Using Okta System Logs to monitor use of basic authentication to Office 365 As promised on the Risky Business podcast , here are some System Log queries to help Okta administrators weed out examples of clients connecting to their Office 365 tenant over basic authentication (“legacy authentication”, in Microsoft parlance.) If you already know why these authentication methods are risky, skip straight on to the queries and containment strategies. Otherwise, read on! In 2019, Microsoft announced...