This article is a sequel for my blog article ‘How to build a call center with Microsoft Teams’ and describes how we can extend our Call Center configuration with the callback function. This is another step that we have the possibility to further improve our Call Center and all this without using 3rd party tools. […]
Microsoft Forms is a powerful tool in the Microsoft 365 suite that allows users to create various types of forms such as surveys and quizzes. In this blog post, we’ll explore how to manage forms that are online for an extended period and how to set up automatic notifications for new responses. What is Microsoft […]
Microsoft 365 provides companies with numerous protective measures that ensure a high level of security for all applications and data. However, a prerequisite for the secure use of Microsoft 365 is that the security functions are actually licenced, activated, used and actively managed. In addition, all users and administrators must be informed about the risks […]
In today’s digital landscape, where communication and collaboration often occur virtually, ensuring user privacy and fostering trust has become paramount. Microsoft Teams, a cornerstone of modern communication, offers a robust recording feature. However, the act of recording meetings can raise concerns about privacy and transparency. To address these concerns, Microsoft introduced the concept of explicit […]
I’m thrilled to announce that I’ve been awarded the prestigious Microsoft Most Valuable Professional (MVP) Award for the sixth year in a row! I’m recognized within the “M365 Apps & Services” category, a designation that reflects my continued passion for helping others navigate the ever-evolving world of Microsoft’s cloud-based productivity suite. For those unfamiliar, the […]
It’s been a few days now since Microsoft announced the next Exchange Server version. You can read my article and the corresponding link to the Microsoft announcement again at the following link: This article takes a closer look at the first further questions about the new Exchange version. Does the new Exchange Server require […]
Microsoft, or rather the relevant product teams, have today made a number of announcements regarding the Deprecation of various services. Here is a summary of the announcements. The three most important points announced are as follows: Abolition of Basic Auth for Outlook.com Basic authentication is a common method that applications use to connect to […]
Microsoft Copilot is not a tool that only needs to be planned for use in the future, no, it is already here and supports us in our daily work today. In this article I will explore Copilot based on Microsoft Learn. This article is a basic summary of information which, in my opinion, is a […]
Microsoft has done it again! What? More feature updates in the Microsoft Teams area. Okay, that’s not much of a headline, as all products and especially Microsoft Teams are constantly being developed further. This article is about a new feature called Private Line. With private line, users will be able to have a private second […]
As an honoured Microsoft MVP immersed in the ever-evolving landscape of technology, I witness first-hand the perpetual metamorphosis of tools designed to elevate our daily workflows, maximizing productivity and efficiency. Amidst this dynamic backdrop, Microsoft Copilot for Microsoft 365 emerges as a beacon of innovation, captivating the attention of professionals worldwide. Having devoted a significant […]
This article is a continuation – i.e. Part 2 – of the article Recommendation – Microsoft 365 authorization concepts – Part 1. In this article, the following topics are now dealt with to complete the start for understanding an authorization concept: Configuration of Exchange online RBAC at Administrative Units level Configuration of automatic users, guests […]
In today’s digital landscape, businesses are increasingly grappling with the repercussions of cybercrime. Cyberattacks are escalating in frequency, and the resulting damage is growing at an unprecedented rate. Among the most significant vulnerabilities for organizations are their passwords, which serve as the entry point into an account and, consequently, represent the weakest link in their […]