Using Office 365 in a multi tenant terminal services environment

Home Forums Office Office 365 Using Office 365 in a multi tenant terminal services environment

Viewing 1 post (of 1 total)
  • Author

  • PeteH

    Short Version of the problem: I have a client interested in moving to Office 365. They are a good sized company where everyone has a thin client using terminal services. We are under the impression that this can’t be done in a manner that will work well and am hoping to find someone that has successfully achieved this.

    More info:

    This client has roughly 1000 employees. They current use 2008 R2 in a terminal services environment. Understanding that MS is moving toward Office 365, they would like to move in the direction of making it happen. It would appear that Office365 doesn’t play well with terminal services. They don’t have to do anything right now. The issues impacting timing are when the MS products reach end of life and when Microsoft only offers Office365.

    So, a solution coming down the pike would be good to know about.

    The thought of ultimately having to spend $1mm on pc’s and hiring three full time folks to make it work isn’t appealing. We talked about having no local MS software and using everything from the web. The concern there is that they do use a lot of fancy spreadsheets and the the on prem version of Excel does things that the online version won’t do.

    Any help would be appreciated.

Viewing 1 post (of 1 total)

You must be logged in to reply to this topic.

External Sharing and Guest User Access in Microsoft 365 and Teams

This eBook will dive into policy considerations you need to make when creating and managing guest user access to your Teams network, as well as the different layers of guest access and the common challenges that accompany a more complicated Microsoft 365 infrastructure.

You will learn:

  • Who should be allowed to be invited as a guest?
  • What type of guests should be able to access files in SharePoint and OneDrive?
  • How should guests be offboarded?
  • How should you determine who has access to sensitive information in your environment?

Sponsored by: