Third party gmail applications
You also need to check that SMTP authentication is enabled for the mailbox being used. SMTP authentication is disabled for organizations created after January 2020, but can be enabled per mailbox. For more information, see Enable or disable authenticated client SMTP sending (SMTP authentication) in Exchange Online.
Specify the following settings directly on the device or in the application, as indicated in your guide (you may use different terminology than in this article). As long as the scenario meets the requirements for SMTP client sending, the following settings will allow you to send email from the device or application.
To determine which version of TLS your device supports, consult the vendor or device guide. If your device or application does not support TLS 1.2 or later, you have the following alternatives:
For information about TLS, see Exchange Online’s use of TLS to secure email connections, and for detailed technical information about how Exchange Online uses TLS with cipher suite ordering, see Enhancing mail flow security for Exchange Online.
Allowing access to less secure outlook applications
In this Privacy Notice, the term “Chrome” is used to refer to all of the Chrome family of products listed above. If there are differences in our policy between different products, we will indicate this. We periodically change this Privacy Notice.
You do not need to provide personal information to use Chrome, but remember that the browser offers different modes of use that will allow you to change or enhance your browsing experience. The Privacy Practices will differ depending on the mode you select.
Changes to browser settings: When you make changes to browser settings, such as adding a web page to favorites or changing options, this information is saved. These changes are not affected by incognito or guest browsing modes.
You can configure customized versions of Chrome for users who share a device or computer. Note that anyone who has access to your device will be able to see all information in all profiles. If you want to really protect your data from being seen by others, use the user accounts built into your operating system. Read more about this
Less secure apps
You can block login attempts from apps or devices that are less secure. Less secure apps do not use modern security standards, such as OAuth, which increases the risk of accounts and devices being compromised. Lock down these apps and devices to improve data security.
Note: When two-step verification is enabled on an account, access to less secure applications is automatically disabled unless users are in a configuration group that allows access to less secure applications. See the Manage access to less secure applications section below.
As the mandatory deployment option is no longer available, we recommend disabling access to unsecure applications now. Start using alternatives to insecure applications as soon as possible.
Disable less secure gmail applications
If an application or site doesn’t meet our security standards, we may block access to anyone trying to sign in to your account from that application or site. Less secure applications can make it easier for hackers to access your account, so blocking logins from these applications helps protect your account.
If your account has access from less secure applications turned off, you can turn it back on. However, we recommend that you only allow the most secure applications to access your account.