Simplify logging into trusted devices
Setting up two-step verification is a smart way to keep your Outlook.com account safe. However, for devices that are only used by you, you can turn off 2-step verification to speed up access to your email messages. On these trusted devices you will be logged in once with your password and code; after that you only log in with a password. If a trusted device is lost, use any browser to revoke this easy access.
The instructions in this article apply to Outlook.com.
Disable 2-Step Verification for Outlook.com for a specific device
To prevent your computer or mobile device from requiring two-step verification every time you open Outlook.com:
-
Open a browser on the device you want to authorize so that two-step verification is not required and go to Outlook.com.
-
On screen Entrance enter your Outlook.com email address (or its alias), then select Further †
If you are automatically signed in to Outlook.com, select the icon Profile and choose Log out †
-
On screen enter password enter your Outlook.com password.
-
Select if desired I want to stay logged in. The device will be removed from 2-Step Verification whether you select I want to stay logged in †
-
Select Enter or click on Enter †
-
On screen Verify your identity select the method (text, phone, or email) you want to use to receive the verification code.
-
Depending on the method you choose, enter your phone number or email address to verify you are the account owner, then select: Login code †
-
On screen Enter a code enter the two-step verification code you received via email, text, phone call, or Microsoft authentication app †
-
Check box Don’t ask me anymore on this device †
-
Select To confirm †
When you sign in to your Outlook.com account on this device in the future, enter your Outlook.com password, but not your two-step verification code. If your account has been inactive for more than 60 days, 2-Step Verification is automatically enabled on your device and you will need a code the next time you log in.
If the device is lost or you suspect someone has access to your device, revoke all permissions granted to trusted devices.