Data retention policies come to Microsoft Teams

Data retention policies in Microsoft Office 365 are now available for Teams locations Managing data is important in scenarios such as complying with regulations or ensuring users have relevant content available to them.  To support this, data retention policies have been available in Office 365 for some time. This allows organisations to perform actions such …

Read more

Microsoft Teams and how to limit access

Suggestions for limiting access to Microsoft Teams & restricting the creation of new teams Microsoft Teams recently celebrated its first birthday and what a year it has been. Today, it is used by over 200,000 organisations in 181 markets and 39 languages. The forthcoming 2018 roadmap is packed with upcoming features including one-click meeting recording, …

Read more

User adoption and its increasing importance

User adoption is now critical in a world of fast-moving change We are working in a world where technology is changing daily. And our workforce is spread across generations, from millennials all the way up to those contemplating retirement. Some people fear change while others embrace it. But it is something we all must accept. …

Read more

The ROI of Office 365: Making a Business Case

Office 365 is Microsoft’s flagship product. It provides the most flexible way of licensing your familiar desktop applications such as Word, Excel and PowerPoint, and offers significant enhancements and benefits in the tools and capabilities it provides to enable you to run your organisation. However creating the business case for Office 365 can be a …

Read more

Client Access Rules for Exchange Online explained

Controlling end-user access to Exchange Online Control of end-user access to Office 365 is an important business requirement. If your organisation has deployed Office 365 you are probably familiar with Azure Active Directory’s Conditional Access Policies. And if Active Directory Federation Services (ADFS) has been deployed, AFDS Access Control Policies. Depending on conditions such as …

Read more

Data residency solved with Office 365 Multi-Geo capability

Office 365 Tenant locations Multi-geo data residency is becoming a necessity for many businesses. ‘Choosing’ a geographic location when creating an Office 365 tenant causes problems for multi-national organisations. They need to comply with different data residency requirements for the countries or industries in which they operate. Also referred to as ‘data-at-rest’ or ‘data sovereignty,’ …

Read more

The future of Microsoft Teams and Skype for Business

During the Ignite conference in September Microsoft set out their vision for intelligent communications. This positions Microsoft Teams as the primary application for communication and collaboration within Office 365, which effectively means that it will eventually replace Skype for Business. Therefore any organisation already using, or planning to use either of these services needs to …

Read more

Planning comes before successful transformation with Teams

So, you’ve heard all about Microsoft Teams? You’ve seen the ‘Teams’ app tile appear in your Microsoft Office Home page? You’re hearing all about the benefits of this extremely powerful, innovative, fully integrated collaboration and communication offering. And you want to start using it right away, yes? Great! But, wait just a little longer. Consider …

Read more

Security breach solutions: Microsoft Office 365 & Azure

The “Assume Breach Paradigm” seems a bit alarmist and unnecessary you may think. “In fact it’s probably just a way of making our organisation spend more” you might say. It is indeed alarmist, but there is substance behind it and unfortunately I have personal experience of breaches. Hence, my view is that some investment is …

Read more

Intrusion detection with Microsoft Azure & Office 365

In this blog, Peter Holland explains why Intrusion Detection is vitally important and why Microsoft’s solutions within Azure and Office 365 are not the intruder’s friend. What is Intrusion Detection? Not long ago, most organisations considered intrusion detection something to do with identifying an external party illegitimately connecting to internal systems and resources. The network …

Read more