Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET

Skype for Business Online

Teams Doesn’t Need Two PowerShell Modules (But Why Two Exist)

with 3 Comments by Tony Redmond

If you work with Teams through PowerShell, you'll know that you sometimes need to open the Skype for Business Online module. It's a royal pain in the rear end to deal with two inconsistent modules. It would be much neater if everything was gathered into one coherent module. However, that's not going to happen much before Skype for Business Online retires in 2021. In the interim, here are seven sets of policy cmdlets that you'll probably need to use to assign policies to multiple users at one time.

Microsoft Releases Teams Administrative Roles

by Tony Redmond

To make things easier for Office 365 tenant administrators, Microsoft has released four new administrative role for Teams. You can now assign these roles to other people and have them take care of areas like Teams general admin or the more complicated area of voice and audio meetings and calling. It's a sign of increased maturity in the Teams product.

Using Office 365 IM Conversation Records for eDiscovery

by Tony Redmond

Teams and Skype for Business Online both capture IM conversation records that can be found by Office 365 eDiscovery (content) searches. All of which is good, but if you ever get around to performing eDiscovery and need this information, you'll find that Skype for Business Online conversation transcripts are easier to use than the individual copies of conversation contributions captured by Teams.

Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: