You could test your theory by creating a fake SecureAccess/Equitrak account that uses a real Office365 email address.
Or do a Wireshark trace to see the failure and compare it to the un-authenticated.
You could test your theory by creating a fake SecureAccess/Equitrak account that uses a real Office365 email address.
Or do a Wireshark trace to see the failure and compare it to the un-authenticated.