Collaborate on documents with Microsoft: SharePoint 2016, Office Online and everything else. Part 1: What is it?

But Microsoft has been unfailingly persistent – they continue to improve their products all the time, on multiple levels as a result, now we can talk about the established infrastructure of document collaboration offered by Microsoft.

An IT specialist’s work time can now be monitored with SkypeTime

Like any other company, IT companies providing high tech services – whether software development, IT outsourcing, or remote infrastructure support – need tools to maintain adequate work discipline.

How to enable BITLOCKER on EXCHANGE servers

BitLocker is the built-in Microsoft Windows feature for full disk encryption that offers enhanced protection against data theft on stolen or lost computers or hard disks.

How to Configure Microsoft Azure Multi-Factor Authentication Server (MFAS) as a Second Authentication Factor

Why MS Azure? Best AD integration, which is very convenient when the same VPN account is used for multiple resources.

Connecting to Corporate Resources via Cisco AnyConnect using FreeRadius and Google Authenticator

Connecting to corporate resources via Cisco AnyConnect using FreeRadius and Google Authenticator has its pros and cons. One noteworthy advantage is the cost: it’s free.

Skype Cloud Connector Edition: The way to Integrate Corporate PBX and Setup PSTN Calls with Skype for Business Online (Office 365)

Skype for Business CCE is a hybrid solution that allows integrating the corporate PBX with the Office 365. CCE offers a set of components offering organizations to connect to the corporate PBX, organize the SIP trunk from your Office 365.

Skype for Business – Cloud Connector Edition (CCE)

A couple of days ago Microsoft released the Cloud Connector Edition (CCE) for Skype for Business Online, a hybrid solution that enables integrating your corporate PBX with the Office 365.

HOW TO DISABLE TELEMETRY ON WINDOWS 10

After the launch of Windows 10 the internet was flooded with messages about the collection of users’ personal data followed by multiple discussions about how to tackle the issue. The user community instantly came up with a list of major servers that collect data and tried to block them via the HOSTS file.

TWO-FACTOR AUTHENTICATION FOR TERMINAL SERVERS

The competent approach to IT security in terms of server authorization, both inside and outside the company premises, implies a number of important measures. They include providing a unique user name and meeting password complexity requirements, as well as conducting the planned password change and non-disclosure of credentials to third parties, etc.

FIGHT MALWARE WITH BUILT-IN WINDOWS TOOLS QUICKLY, EFFECTIVELY, AND FREE

Malware, or malicious software, stands for a broad range of applications designed to harm your computer or use it to do damage elsewhere. Malware comes in different shapes and sizes including viruses, Trojan horses, spyware, and others