Identity Attacks Guide

Legacy Authentication Risk

Legacy authentication refers to older sign-in methods and protocols that were designed before modern MFA and Conditional Access became standard. In Microsoft 365 environments, POP, IMAP, SMTP AUTH, and older Office clients are common examples.

For small businesses, the risk is practical: an attacker with a stolen password may be able to authenticate through an older protocol that does not enforce the same protections as a modern browser or Outlook client. Blocking legacy authentication is one of the highest-value Microsoft 365 security improvements, but it should be planned so printers, scanners, and older apps do not break unexpectedly.

Estimated reading time
8 minutes
Primary systems
Older mail protocols and clients
Who this guide is for
Small-business owners, office managers, clinics, law firms, accounting firms, consultants, and IT decision-makers with 5-50 employees.
Last reviewed
April 2026

What it means

Modern authentication supports stronger controls such as MFA, Conditional Access, device checks, and risk-based decisions. Legacy authentication usually presents a simpler username-and-password path.

The danger is not that every older protocol is actively malicious. The issue is that attackers prefer the weakest available door. If modern sign-ins require MFA but an older mail protocol still accepts only a password, the tenant has an avoidable gap.

How it affects small businesses

Small offices often discover legacy authentication through old scan-to-email setups, accounting software connectors, mobile mail apps configured years ago, or former IT decisions nobody documented. These dependencies are normal, but they need to be identified before enforcement.

A clinic may rely on a multifunction printer to send scanned forms. A law office may have an older mail client on a partner laptop. An accounting firm may use SMTP AUTH for a line-of-business app. Security improvement should preserve operations while replacing weak authentication paths.

MFA bypass risk

Older protocols may allow password-only authentication even when users believe MFA protects the account.

Silent operational dependencies

Printers, scripts, and older applications often fail without clear user-facing errors.

Low attacker effort

Legacy protocols are easy to test automatically once usernames and passwords are obtained.

How the attack usually starts

Legacy authentication risk usually starts with an old protocol or client that still accepts a username and password without the same modern checks as browser-based sign-in. POP, IMAP, SMTP AUTH, and older mail clients are common examples in Microsoft 365 environments.

Attackers do not need the protocol to be fancy. If a stolen password works through a weaker sign-in path, they can attempt mailbox access while the business believes MFA is protecting every login.

Old scan-to-email setup

Printers and scanners often use SMTP AUTH with a mailbox password.

Older mail clients

Legacy Outlook, mobile mail apps, or archived device profiles can continue using old protocols.

Stolen password testing

Attackers test older protocols because they can be easier to automate and may not enforce MFA.

What attackers are trying to achieve

Bypass modern MFA controls

Older protocols may allow password-only access if not blocked.

Read or send mail

Mailbox access can support fraud, reconnaissance, or internal phishing.

Find weak service workflows

Accounts used by scanners or apps may have weak passwords and little monitoring.

What it looks like in a real small business

A 12-person clinic enables MFA for staff, but an old scan-to-email mailbox still uses SMTP AUTH. The password was set years ago and is stored on a multifunction printer. Sign-in logs show repeated SMTP attempts that no one reviews because interactive MFA appears healthy.

The fix is not to break scanning during clinic hours. The practical approach is to inventory legacy usage, replace the workflow with a supported relay or modern method, then block legacy authentication and monitor the cleanup period.

Common warning signs

Sign-in logs showing POP, IMAP, SMTP, or old Office clients

Client app details in Microsoft 365 logs help identify who or what still uses legacy authentication.

Scan-to-email using a mailbox password

Printer workflows that authenticate directly to Microsoft 365 often need redesign before blocking SMTP AUTH.

Unexpected successful sign-ins without MFA prompts

Password-only access paths should be reviewed immediately.

Users with very old Outlook or mobile mail configurations

Older clients may need updates, account reconfiguration, or replacement.

Signals to check

Client app in sign-in logs

Filter Microsoft 365 sign-ins by POP, IMAP, SMTP AUTH, Exchange ActiveSync, or older Office clients.

Accounts used by devices

Identify scanner, printer, app, and service accounts that authenticate with mailbox passwords.

Successful non-interactive sign-ins

Review successful password-based attempts that did not require modern authentication.

Conditional Access report-only results

Use reporting to understand what would break before enforcing a block.

What to do first

Inventory usage before blocking

Use sign-in logs to identify who or what still uses legacy protocols.

Replace business dependencies

Move scan-to-email, app connectors, and old clients to supported modern options.

Block legacy authentication

Use tenant settings and Conditional Access where available.

Monitor after enforcement

Watch sign-in failures and user reports so legitimate workflows are corrected quickly.

How to reduce the risk

Inventory legacy usage before blocking

Review sign-in logs for legacy client apps over a representative period so business dependencies are visible.

Disable legacy authentication

Use tenant settings and Conditional Access controls to block old protocols once exceptions have been remediated.

Move to modern authentication

Update Outlook, mobile apps, and connectors so they can support MFA and Conditional Access.

Replace weak scan-to-email patterns

Use supported relay, application-specific options, or vendor-recommended modern methods rather than a shared mailbox password.

Monitor after enforcement

Expect a short cleanup period. Logs help distinguish a real outage from an old device that needs reconfiguration.

Common mistakes

Turning on MFA but leaving old protocols

MFA coverage can look good while password-only paths still exist.

Forgetting printers and scanners

Scan-to-email is one of the most common blockers in small offices.

Using shared mailbox passwords

Shared workflows should be redesigned rather than protected with a shared secret.

Blocking without a rollback plan

A planned change window and validation checklist prevent avoidable disruption.

CtrlShift IT review checklist

In a security risk review, we focus on the operational checks that show whether the control is actually working for a small business, not just whether a setting exists.

Legacy protocol usage report

We identify users, devices, apps, source IPs, and client types still using older authentication.

Scan-to-email and app dependency review

We map printers, scanners, line-of-business apps, and service accounts before enforcement.

Modern authentication readiness

We verify Outlook, mobile apps, and connectors can use modern authentication.

Conditional Access alignment

We confirm Security Defaults or Conditional Access policies block the right paths.

Post-change validation

We test mail flow, scanning, user sign-ins, and alerts after the change.

FAQ

What is legacy authentication in Microsoft 365?

It refers to older sign-in protocols and clients, such as POP, IMAP, SMTP AUTH, and older ActiveSync connections, that may not support modern MFA and Conditional Access properly.

Will blocking legacy authentication break scan-to-email?

It can if a printer uses SMTP AUTH with a mailbox password. Review sign-in logs and replace that workflow before enforcement.

Is SMTP AUTH always bad?

SMTP AUTH can be needed in some controlled cases, but it should not be broadly enabled. Any exception should be documented, restricted, and monitored.

How do I find legacy authentication usage?

Use Microsoft 365 sign-in logs and filter by client app or protocol. Review both successful and failed sign-ins over a representative period.