Exchange: Stop Email Exfiltration
When your users leave or get removed from the organization they may still be getting company confidential information. Here is how you can find out and stop this from happening.
Continue readingWhen your users leave or get removed from the organization they may still be getting company confidential information. Here is how you can find out and stop this from happening.
Continue readingIf you have been following along this series you already know the importance of getting a recent PSTN provider bill and performing an onsite visit. Next we will go into more depth on how the site PSTN is configured with your PBX at a site. There is lots of ground to cover so lets dive right in!
Continue readingI’ve already gone over the basic phases of a Skype for Business enterprise voice deployment in my prior article. Now it is time to skip right over the first two of those phases and start preparing to replace your existing PBXs. To prepare you need to know what you are going to be replacing. In this article we will be focusing on beginning the information gathering process.
Continue readingHere is a quick bit of PowerShell. It is some snippets of C# code wrapped up with PowerShell which will allow you to assign accounts to the ‘login as batch job’ local security rights of a local machine. The code is no great shakes but it is a good example of how you might take some existing online code and modify to suit your needs in PowerShell. This function also compliments another script I’ve released in the past for automatically scheduling PowerShell scheduled tasks rather well.
Continue readingHere is a comparison chart I put together describing the different call forwarding options available to end users or their teams. This covers everything which can be setup by users in Lync as well as team calling (setup by the admin).
Continue reading