Posts

Virtual Roundtable Recap: Facing and Overcoming IT Challenges In Education

Education IT Event

This week, our panel of special guests came together for an educational virtual round table event. Our panellists discussed the challenges they have faced in their education provider and how as IT professionals, they overcame these challenges.

We also opened the floor up to our selected guests so that the panel could try to help them with their challenges.

Our panel included:

David Higgs, Security and Service Experience Centre Lead at Imperial College London

Mike Pearce, ICT Network Manager at St. Cuthbert’s Roman Catholic Academy Trust

Graham Rivers, ICT Network Manager Moulsford Prep School

James Dell, Head of Technical Architecture and Education specialist at Planet IT

 

Discussion Points included:

  • The challenges encountered when delivering IT solutions to their organisation
  • How our guests overcame these challenges and turned them into successes
  • New trends & technologies critical for educational IT in the next 12 months
  • The ever increasing threat of cyber attack
  • BYOD (Bring Your Own Device)
  • Hiring and building a team on a budget

 

Did you miss it? Or would you like to watch it again? Well, the good news is that we recorded it and you can check it out here:

Remember, if you you have any questions or challenges that you dafe in your Education IT career, then please reach out to James Dell and he would be more than happy to talk you through the solutions he found to any similar obstacles. Call 01235 433900 or email james.dell@planet-it.net

 

Internet Explorer is Dead – What you need to do now

Internet explorer

Internet explorer is finally coming to the end of its long slow walk to its grave. As of the 15th of June 2022, all devices not running an LTSC or Long Terms Servicing Channel version of Windows 10 or Windows Server will lose the application as part of the 15th of June update.

However, this is much larger than many would initially perceive. Many custom-built or 3rd Party applications use the IE framework to deliver content and allow users to interact with their platforms. The removal of internet explorer, which long advertised and overdue, will affect many businesses adversely.

To make your life a little easier there are actions you can complete now to engage the Microsoft Edge support for many of these legacy programs, and to make life easier, you can follow the steps on page 5 and 6 of this document, from Microsoft that will help you make your business Microsoft Edge ready.

Does It Matter?

For many of you, this won’t be an issue, but remember now is the time to be testing this; if you have any application that opens on IE11 session by default on Windows 10 or Windows Server, you need to ensure it runs in Microsoft Edge before the 15th or move the server/ desktop to the long-term servicing channel if you cannot support the application.

As a side note, it is worth noting that Office 365 and all Microsoft services will not support Internet Explorer from the 17th of August in any form, so while you can use IE on LSTC to support custom applications, you will struggle to use the product for anything outside of these products and Microsoft. Many other vendors are moving fast to drop Internet Explorer from their supported browsers lists.

If you have 3rd party applications which rely on Internet Explorer, now is the time to be reaching out to my team at Planet IT to start looking at how you move away as not only is this issue going to become worse but with no updated Internet Explorer is likely to be a source for vulnerabilities we see when scanning people’s networks.

If you want to talk to one of our team about how we can help you move away from Internet Explorer and associated 3rd party applications. Then please call 01235 433900 or you can email architecture@planet-it.net or if you would like to speak to me directly, you can reach out to me via DM or at james.dell@planet-it.net.

IE death

 

Education in Focus: Biggest IT Refresh Year Ever

Education IT

There comes a point in the academic year where exams ramp up, teachers, lectures and support staff are focused on getting student’s through their end of year exams and keeping the momentum up until the summer break.

Meanwhile in the cool dark of the server room, the IT Support teams across all academic settings are preparing for the calm before the storm.

This year, while we may not be seeing exams like we previously would, the IT Teams in our educational establishments are preparing for their busiest summer refreshes ever. The woes of 2020 are behind us and the shift to classroom learning returning for 2021/22, the push is on to make the infrastructure improvements that were put off during COVID.

Saying all that, budgets are likely to also be tighter than ever. So how can IT teams get the absolute most out of their IT projects?

To help we have put together 5 top tips for smashing your summer projects in 2021

Plan Early

When it comes to any form of IT project the further ahead you are planning the better chance of success you have, so start early!

Engage vendors and technology partners. Test the market and understand your options. If you are looking 6 months ahead of where you need to be, then when do you have to make the choice on the technology or the vendors you are going to use? Be armed with all the information you need so you can overcome the challenges the project throws at you.

School ITHave a contingency plan

As you begin to plan your project, look at the what if’s…

For example, if you are replacing a server infrastructure, what happens if the new servers fail? Or before you have moved the data, if the old servers fail, do you have a backup? Have you tested it?

By implementing a rock-solid contingency plan you are positioning yourselves in such a way that you can overcome whatever challenges come your way.

Choose a partner you can trust

Remember you are not in this alone.

Whatever the chosen project you are undertaking there are partners who will help you achieve the goals of your organisation. However not all partners are equal. Not all partners have the same approach.

Find a partner who has the certifications and accreditations with the vendors you want to work with, i.e Dell Gold Partner or Microsoft Gold Partner with certified engineers. Don’t settle for “the local firm” as 9 times out of 10 they will get out of their depth very quickly. They’ll can end up making the challenges of delivering IT in education much worse.

So, pick a partner you can trust, and you know when you’re up against it, will have your back!

Only choose best of breed technology and don’t settle for last generation.

Lots of companies see education as an opportunity to move stock which the corporate world no longer wants – for example, servers which are now end of sale or software which has been pushed into its last few operational years.

You should never settle for anything other than the best in breed technology for your establishment. If budgets constrain that, reduce the scope of the project or limit the technology used. Don’t settle for old, refurbished or reconditioned equipment just to hit a financial goal. In the long term, you will pay the price when the equipment cannot be serviced and needs replacing before the business has got the full value from the solution.

Maximise gains using operations leasing

When making purchases in education, you have a great opportunity to access low cost or even free finance offerings for all of your large purchases. So, leverage these deals to extend your budget.

Limit the capex spend and get the best solution you can and prevent the project delays of stretching upgrades over 2-3 years which really need to be done today.

Using these top tips, your organisations should be able to avoid the pitfalls of so many education providers in the past and make sure you take step in the right direction when making your upgrade this summer.

Just remember you are not alone. At Planet IT we have a team of specialists who can not only support you with the decision making and selection of new equipment, but can support with the role out, implementations and upgrades to your systems.

If you want to talk to one of our educational team about how we can help you with your summer projects then please call 01235 433900 or you can email architecture@planet-it.net or if you would like to speak to me directly you can reach out to me via DM or at james.dell@planet-it.net.

 

Backup Webinar Recap: The Uncomfortable Truths

Backup webinar recap

This week, we hosted a Live Webinar based all around the Uncomfortable Truths about your Backups.

Our resident Backup guru, Michael Davey was joined by Arcserve expert, Steve Butterfield and between them they covered

✅ Microsoft 365 data protection

✅ Immutable storage & Ransomware Protection

✅ How are you storing your data & the 3-2-1 rule

✅ Scaling your infrastructure with Backup & DR

✅ How to combat storage creep

 

Did you miss it? Or would you like to watch it again? Well, the good news is that we recorded it and you can check it out here:

Your Questions, Answered.

We received lots of questions throughout the webinar. Unfortunately we weren’t able to answer them all during the live session so we have compiled them all and asked Michael and Steve to answer them again.

Remember, if you you would like to find out more about backup in general or speak about your own backups specifically, get in reach out to your Planet IT account manager, call 01235 433900 or email enquiries@planet-it.net

 

Would cycled tapes not be immutable being out of the drive most of the time?

Tape and especially WORM tape were the original air-gapped / immutable storage

While out of the drive then tapes are largely immutable outside of extremes involving strong magnets, But you do have to put them in the libraries to use them which brings two issues,

1. They are available to be overwritten while in the library.

2. They require manual intervention to remove/replace.

However, definitely a big improvement over no airgap.

 

What is the licensing model? Is it based upon per user for 365 and per source TB for onsite storage?

Universal licensing which runs on your own hardware or VM covers all data sources including O365 and so is

licensed per TB of protected data, no limits on retention and can be any mix of Physical machines, Virtual machines and O365

Per user licensing is also available and may be of interest if you are adding it to existing Arcserve licensing.

Per user or per TB licensing is available from our cloud (SAS Offering )subject to a max of 100 users per TB for capacity based licensing )

 

The reason people do Full backups is because incremental backups all depend on the previous ones , isn’t that a disaster waiting to happen with incremental forever ?

Our Incrementals act and restore like Full backups, they do not depend on any other incremental backup therefore one “Broken” incremental affects neither the incremental before or after it.

 

What is the most common security breach you see that can also impact backups?

I think Michael answered this but a stat for you from Sophos “The state of Ransomware 2021”

37% of the 5400 respondents surveyed were hit by Ransomware in the last year

Ransomware is still the major threat

 

 

A pretty bold statement was made “Completely Ransomware Safe” Can you back this claim with something factual?

Like Unsinkable ships, Completely ransomware safe is conditional on the type of attack i.e. Nothing is completely safe if Physical access is allowed for instance , however we believe that our Ransomware capability is the strongest and most complete in the industry and we are the only backup vendor to offer a Money Back Guarantee.

For 0365 backup only do we need an onsite appliance?

You have choice, You can purchase Arcserve UDP and have it protect O365 in the following ways

  1. An Appliance running on Prem or in hosted Colo
  2. Software running on your own hardware, VM or in your own public or private cloud instance
  3. Software as a service running from our Cloud based from our Datacentre in Manchester or AWS in London ( Other Geo’s are available )

While On-Prem may seem an odd choice to some for a cloud based service, do remember the 3-2-1 rule and the fact that even in the event of an Internet or Azure outage you could still access your data locally. The main thing is it is held elsewhere so we would always caution against any service backing up O365 which is hosted in Azure

 

 

What is Conditional Access, and why is it an essential part of your security posture?

Conditional Access

By now, you should be aware that the modern digital landscape is full of threat actors. That are always looking for any opportunity to find a weakness in a business’s security posture and then leverage this to gain unauthorised access to data for malicious reasons.

To protect against these attacks, we often look at antivirus and anti-ransomware technology and products like MFA or Two-factor authentication. The truth is that MFA is part of much larger protection that can be afforded a system through an approach known as Conditional Access.

How does Conditional Access work?

Conditional Access (CA) is the process of defining entry vectors and criteria; in its most simplistic form, consider CA to be a door that only opens if you are wearing the right clothes, have arrived in the right vehicle, and are holding your ID. In real terms, CA allows a business to define controls around what can be accessed by who, from where and under what circumstances.

I feel that conditional access is an underutilised part of any defence arsenal. This is partly due to a lack of understanding in the IT community about the technology and a misconception about its limitations. These beliefs and options come from a legacy of Software as a Service (SaaS) and on-premises infrastructure being integrated minimally, however with modern SaaS, IaaS, PaaS and on-prem working in a heavily integrated way. Conditional Access allows you to take advantage of the proper protection that can be afforded a system without comprise.

Is it widely used?

All the major SaaS, IaaS and PaaS vendors support conditional access, and an optimum way to deploy the technology is as such.

  • Limit access to login to Geo Locations that are trusted and used by the business
  • Allow internal networks or trusted networks to have fast passed authentication
  • Only allow data access from trusted and complaint enrolled devices
  • Require MFA in any location that is not inside a trusted network
  • Remove support for legacy authentication methods
  • Deploy true Single Sign-on across all platforms and devices
  • Limit access to the data and services a user needs based on the roles of that user
  • Only allow devices that have Antivirus and Anti-ransomware installed and up to date
  • Only enable devices that have the latest operating system updates
  • Integrate all systems into a single platform, use Conditional Access and MFA to protect the whole network, not just cloud services.

By undertaking this approach, you can reduce the attached surface of your infrastructure and protect data while not limiting your staff’s functionality by placing unwanted security barriers in place.

The diagram below shows how the conditional access approach works.

Conditional Access Explained

Conditional Access

Do you think your business could benefit from the technologies of conditional access? Do you want to know more? Then please reach out to a member of the Architecture team at Planet IT via architecture@planet-it.net or call 01235 433900, and we can talk to you about the options available that work with your more comprehensive technologies.

4 Steps to the Perfect Backup Plan

World Backup Day

Today is World Backup Day, for many it’s a day to be celebrated, but for just as many, it’s a stark reminder of the dark omen that is an uncertain backup environment or plan.

We all know the basics of backup right? The things we all want to achieve

  • Retention
  • Redundancy
  • Recovery

I could happily go on for far longer than any of you would care to read on each of these topics!

Today however, I want to talk about the practical elements of making sure your backups and overall disaster recovery plan are the best they can be. Starting with some basic questions.

  • Are you backing up your whole environment?
  • Are you running your backups daily?
  • Are your backups retained for the right amount of time?
  • Do you take backups off-site?
  • Are your backup sets fully automated?
  • Are your backup jobs encrypted?
  • If you have cloud resources (Microsoft 365, Azure, AWS) are these backed up?
Back up servers

In an ideal world, you would want each of the above to be a confident and resounding YES! However, this is not always the case – we often hear the ill-fated “I don’t know”.

So, what can we do to be certain on the above and confidently rest knowing our backups will be there for us should the worst occur?

Step 1 – Check the List 

Firstly, I would start by checking your infrastructure or approach your IT Team to get the answers to the above questions. Understand that if the answer to any of them is no, in this first step, it’s less important to know why, just to understand the position you are currently in. Once you’ve established that, let’s move on to step 2.

Step 2 – Check the Kit 

Once you have a firm understanding of your overall backup integrity, it’s time to push past the smoke and mirrors and figure out exactly what you are working with. Check your storage, check your software and make sure it isn’t letting you down. There are so many options available in today’s market, but a quick search of your products and the competition should help you understand if you need to make any changes.

Step 3 – Make your Plan

At this point, you’re either happily relishing in confidence… or you’re not.

If you’re not… bear with me, I promise, we’ve just ripped off the worst of the band-aids and from here… the only way is up. When making your plan, it’s important to work out what you need first, what you want second and then figure out the cost implications (if any) your business will need to work towards. Everyone loves a good deal (or better, a free deal!) but sometimes investment is required to ensure you have the right infrastructure for your plan. When making your plan, make sure you are referencing the list from Step 1 and work out the following:

  • How long do I want to keep my backups?
  • What is my off-site storage plan?
  • Do I have Cloud Resources that need to be backed up?
  • How efficient do I want my backups to be?
  • How long can I afford to be offline in the event of a disaster?
  • How much data can I afford to lose in the event of a disaster?

The answers to these questions will help you to understand how much storage you need, whether you need a cloud or second-site storage plan, if you need high performance equipment and your Recovery Point/Time Objectives. Know that even if the plan is loose, it’s more than you had at Step 1 and it will help you enormously when collaborating with your teams, suppliers and peers to achieve the best outcome.

disaster recovery plan

Step 4 – Reach Out 

At this point, we’ve gone from scratching our heads, to having a clear understanding of the potential issues, a goal to aim for and a plan to get there. Now it’s time to reach out.

Speak to your team and your suppliers and get them on board with your plan. From this point forward, you’re taking control of your backup & disaster recovery plan. You’ve worked out what you want to achieve and you’re making it happen. That, or you were happy from Step 1 – either way, grab a coffee and your favourite lockdown biscuit, you’ve earned it!

Remember, if you ever have any questions, just ask. I, or one of the team here at Planet IT, are always happy to be used as a sounding board and can offer our expertise for your specific situation.

Feel free to reach out to me via LinkedIn or email me at michael.davey@planet-it.net.

HAFNIUM and Exchange Vulnerabilities – What To Do Now…

Hafnium Attack

There has been lots of noise in the press and on social media about the HAFNIUM threat actors and the current vulnerability that has been detected in all current versions of Exchange on premise.

If you haven’t read up on the attack and the risks you can do so here;

https://www.bleepingcomputer.com/news/microsoft/microsoft-march-2021-patch-tuesday-fixes-82-flaws-2-zero-days/

https://www.kaspersky.co.uk/blog/exchange-vulnerabilities/22385/

https://www.volexity.com/blog/2021/03/02/active-exploitation-of-microsoft-exchange-zero-day-vulnerabilities/

These articles have been leaving a lot of IT managers and CTO running around looking for solutions. They need a way to quickly patch up the servers and cover over a hole that has been there since at least last November, when as far as the first reported case of an attack using this vulnerability. However, what do you need to be doing next?

We all know that Microsoft issued patches on a non-standard update to Windows or a (out-of-band) update. For those out of the know, this means this Hafnium vulnerability is bad! Microsoft rarely break their patch cycle but when they do as with the SMB vulnerabilities with WannaCry. When they do it means you need to be act fast.

By the time these latest OoB updates where released, Microsoft made it clear that these attacks where already happening, which means for some of you who are readying this article thinking you are safe because you ran the patch, you may not be.

The four most dangerous vulnerabilities already being exploited allow attacks to pull off a three stage attack on compromised systems.

The attack chain is simple;
  1. First, access a compromised Exchange server (one missing the patch) this can even be an Exchange Management point for Office 365, it doesn’t need to be a full running system.
  2. Then they create a Web shell for remote server access
  3. They then use this to harvest data from the network and systems associated with this Exchange server, essential using it like an open front door.

So how do you protect against the Hafnium threat?

This is where you need to be looking at having a product in place as your antivirus/antimalware which uses EDR or XDR technology and has up to date behaviour and exploit prevention and detection.

Watch out for the following detections

  • Exploit.Win32.CVE-2021-26857.gen
  • HEUR:Exploit.Win32.CVE-2021-26857.a
  • HEUR:Trojan.ASP.Webshell.gen
  • HEUR:Backdoor.ASP.WebShell.gen
  • UDS:DangerousObject.Multi.Generic

So what should you do next?

As Microsoft has already released an update to fix all these vulnerabilities, we strongly recommend updating Exchange Servers as soon as possible, Microsoft have even gone as far as releasing a quick install roll up which should work for most Exchange servers. For more complex deployments like DAG’s, then Planet IT can support you with this process.

You then need to focus on your defence strategy on detection lateral movements and data exfiltration to the internet. For this we recommend that you pay special attention to outgoing traffic to detect cybercriminal connections.

As always you should ensure that you are backing-up regularly and make sure you can quickly access it in an emergency, if you have questions on this then Michael Davey – Michael.Davey@planet-it.net and his Back Up Services team will be more than happy to help.

Make sure you have an Endpoint Detection and Response product in place. If you don’t reach out to your Planet IT account manager who can provide you with details of what is available and works with your security landscape.

Finally make sure you are using a reliable endpoint security solution such as Kaspersky or Sophos that has included in it Exploit Prevention, Behaviour Detection, a Remediation engine. It would also be beneficial to ensure that your product has a Vulnerability and Patch Management capabilities.

If you would like to discuss with myself or any of the cyber security team at Planet IT about how you can better protect you business, should that be with new technology, strategies or even better back ups you can reach us using the contact details below;

Contact me at – LinkedIn Message James Dell or Email : james.dell@planet-it.net

Call 01235 433900 or Email : enquires@planet-it.net

Education in Focus: Cyber Attacks on the rise while protection remains behind other industries

Education Cyber Attack

2020 was far from an easy year for the education sector, with the strains of COVID-19, the forced move to remote learning and the constant moving goals of exams, assessments and certifications looming over the industry. IT improvements and IT budgets were shifted from infrastructure and enhancements to purchasing laptops and enabling learning over video. These changes have had a dramatic impact on all educational organisations. Unfortunately, we are starting to see the repercussions of this, with several educational organisations being hit by cyber-attacks.

Another Attack

This week we have seen the latest attack on the University of Northampton, this is unfortunately just another in a long line of victims of the last few years.

As many of you who have read my articles are aware, I have a long history in the education sector, working across schools, academies, and colleges. From this, I have a very first-hand experience of how budgeting works in education. I know its effect on the choices that we make when it comes to selecting solutions and ultimately protecting educational establishments.

When I read stories like the one about the University of Northampton, it churns my stomach. This is because I know that the ladies and gentlemen who work in the IT teams of these organisations will have been doing everything they could to protect the system. However, they are always constrained by the limits they have finically and with their current technology stack. Having personally experienced several attacks first-hand, the IT Team usually takes the brunt of the fallout from these events. In truth, it’s business management and senior management, who’s lack of understanding, allows these incidents to happen.

university cyber security

The real-world cost of an attack

When these kinds of cyber attacks in education occur, we all see the headlines and the public outcry about the fact these threat actors get into and disrupt educational organisations. What is very rarely discussed is the organisation’s cost.

The cost itself is not just that of recovering from the breach. Depending on what equipment has been affected and what can be recovered, the cost anywhere from £10,000 to £500,000!

However, on top of this, you have to add the cost of staff not working. The organisation not being able to deliver teaching and learning can easily cost an organisation over £50,000 a week.

We then have to consider the cost of the damage to the organisation’s reputation and any fines that may come in from the ICO if data has been lost. These costs can total into millions.

The worst part of all of this is that insurance will not always cover these costs if you have the wrong cover type. In a real-world example, we are aware of a case where an educational organisation had a total cost of an outbreak at £2.5 Million, this figure should be enough to make your senior management sit up and pay attention.

Where to start…

The question then is, how do we get our educational sector partners to a position where they can protect their data, deliver teaching and learning and ultimately avoid cyber attacks in education?

The answer is about prioritising spending and focusing on ensuring that a security landscape is in place that covers all bases and protects against all foreseeable attack vectors. We start this with solid anti-virus and anti-ransomware technology. Endpoint protection must be paired with a robust Endpoint Detection and Response product (EDR) or an Extended Detection and Response product (XDR). These technologies will give you a strong endpoint protection roster.

Then layered on top of this, you need to look at device encryption, which must be centrally managed. Then, on top of that, we need to pivot and look at the ingress points on your network, this being your email and your firewall. Both should be robust next-generation products that use both Unified threat management and a traditional stateful firewall approach.

school cyber security

And then there’s the human element

When we have tackled the technical delivery needed to secure the network, we need to look at your staff and the human firewall element of protection. From this regard, we should be looking at Phishing training, security awareness and data protection training.

When you have all these pieces in line and configured to best practice, then there is a good chance that you will mitigate most risks towards your organisation. Now, that doesn’t mean your senior management can wash their hands of cybersecurity. Proper cybersecurity protection is reviewed and maintained regularly, and this also means patching all your other IT systems; it’s a busy and full-on task to undertake. However, if you do it correctly, it’s advantageous knowing that you are keeping your learners, staff and visitors safe and protecting against the effects of a cyber-attack on the business, individuals and the wider community

If you would like to have a conversation about how we can review your security landscape and work with you to build a robust cybersecurity landscape for your organisation, then CLICK HERE to book a meeting with me, or you can email me at james.dell@planet-it.net and together we can work to align your organisation against the current and future risks.

Sophos MTR vs Security as a Service. What’s the difference?

sophos MTR vs Security

What is Sophos MTR?

Sophos MTR Standard or Managed Threat Response, provides 24/7 threat hunting, detection, and response capabilities delivered by an expert team as a fully managed service. What that means is a dedicated team at Sophos will monitor your environment and act on any threat detections using the EDR technology that we are a massive fan of here at Planet.

IT is offered as an optional service add-on with Sophos Intercept X Advanced with EDR.

Sophos MTR Advanced goes one step further and will actively go looking for potential threats. It proactively improves your security by recommending configuration changes and reporting on vulnerabilities.

How does Planet IT’s Security as a Service (SECaaS) compare with Sophos MTR?

Let me start off by saying that Sophos MTR is a fantastic service, there is no denying that. But you do have options should you want this protection but want to explore different avenues.

Here at Planet IT, we offer an alternative service that will give you the peace of mind of MTR, while being more aware of the fact that many of you will have technologies outside of the Sophos stack.

Alongside this we know that for many of our customers the biggest risk is always the recovery and with Sophos MTR there is quite rightly an end to where Sophos can provide services. With SECaaS we stick with you and can support you to the bitter end.

I have compared the offerings of Sophos MTR with Planet IT’s Security as a Service (SECaaS) in the table below:

 

Feature Sophos MTR Planet IT SECaaS
24/7 support Office Hours
Dedicated Account Manager
Direct Call-In Support
Asset Discovery via Endpoints X
Enhanced Telemetry via Endpoints X
Activity Reporting Sophos Only All Security Vendors
Periodical Health Checks Sophos Only All Security Vendors
Vulnerability Scanning Sophos Only All Security Vendors
Firewall Support Sophos Only All Security Vendors
Completely mitigate through to completion Sophos Only All Security Vendors
Penetration Testing X
Windows Updates X
Phishing Training & Testing X
Email Protection X
Cyber Essentials / Plus X

 

Verdict

Sophos MTR is a great service if you are a large organisation with the requirement for 24/7 support and have the resources to afford it. If you have an internal IT team in place to work in collaboration with Sophos to completely remediate any threats, it really is a top solution.

However, as you can see above Planet IT’s SECaaS offering is more than sufficient to give you the peace of mind you need. We will work with you to recommend and provide the solutions right for your business and support you until any threat is mitigated, no matter what security products you use.

Add in our other services such as Windows Updates as a Service, Vulnerability Scanning (not just for Sophos products) / Penetration Testing and Cyber Essentials as a Service, you can rest assured that SECaaS will keep you safe and updated as much as possible!

About Adam Harrison

My name is Adam, and I am a security-focused Technical Architect. It is my job to provide expert advice on security solutions and assist our customers with protecting their environment from viruses, ransomware, and other nasty attack vectors! My background is in Security as a Service, Infrastructure and Helpdesk Support; I keep myself up to date with the latest threats and security products, so you don’t have to!

If you want to talk to me about how Sophos Intercept X with EDR would fit into your business then please call 01235 433900 or you can reach out to me via DM or at architecture@planet-it.net

Microsoft Teams Webinar Recap: A record attendance & your questions answered

Microsoft Teams Demo

This week, we hosted a Live Demo Webinar based all around using Microsoft Teams as a Unified Communications Platform to replace your existing phone system. We have never had more interest in the build-up for one of our webinars, and the actual event did not disappoint!

We had well over 100 businesses join, many with multiple people to see the power of Direct Routing for Microsoft Teams.

Our experts, Farah Nazir-Chapman and James Dell demonstrated the platform to show just how powerful this tool it. Not only can it completely replace your existing phone system, but they also showed how it can save your business money too.

Did you miss it? Or would you like to watch it again? Well, the good news is that we recorded it and you can check it out here:

Your Questions, Answered.

A sign of a good webinar is the quality of the questions asked at the end. We had 65 questions before we had to call time, otherwise we would have been there all day! What’s more, sometimes on these webinars, you see a drop off towards the end. 98% of the attendees stayed until the last question was answered.

Did you miss some of the answers? Good news. We have compiled them all, merged a couple and got James & Farah to answer them again.

Remember, if you you would like to find out more about Microsoft Teams, or if your questions are not answered below, please visit our Direct Routing For Teams webpage. You can also reach out to your Planet IT account manager, call 01235 433900 or email enquiries@planet-it.net

 

If I get a call to my mobile from someone dialling my company number rather than my mobile direct is there a way of ID’ing this?

If I get a call to my mobile from someone dialling my company number rather than my mobile direct is there a way of ID’ing this?

 

We have a switchboard where we have on the 1st level with 9 option then on some of them we have another menu can the team PBX do this?

Yes, it can do two levels of an IVR/ Automated attendant

 

Voicemail – can you receive the voicemail on an email?  (So you can forward it to somebody else)

Yes, voicemails come in via the Teams app and you can set them to also be delivered to Email in the form of a WAV attachment. Which can be forwarded on.

 

Can you set up hunt groups on teams and can you setup timer so if one department don’t answer within 1 min it will auto call the next group

Yes, You can configure the call queues to fail over to another queue should the one they enter not be able to take the call.

 

Hello – thank you for this very helpful introduction! Do you have guidance available on a document? Looking for something that could be made available to our employees about all the features available. Thanks.

We do have documentation we can share, if you reach out to your Planet IT account manager, they will be able to assist you with getting access to our documentation.

 

Can we configure automatic message for Unknown or Hidden number to say we’re not answering call from them?

Yes we can route the call to a message.

 

Hi, is there feature parity between Teams on Windows and macOS? We are exclusively macOS, are there any caveats to note?

Between the desktop versions of Teams there is now very little in the way of feature difference, with most updates hitting both MacOS and Windows on the same day or same week. The major differences are between Windows and iOS and Android, however this game is also reducing.

 

Does the caller get notified that the call will be transcribed? Do you foresee any privacy issues with this feature?

The caller does not get notified when the call is being transcribed, however there is no legal obligation to do so as it does not fall under call recording as its purely a record of the call and not a live recording. If you wish to record a call a user would be notified.

 

I’m mainly interested in how this would integrate with our current DDI’s etc. is this something you are going to cover?

Planet IT work “port” your existing DDI numbers onto the direct routing for Teams platform.

 

Are Teams physical handsets available?

Yes you can get a range of physical devices that are Microsoft certified for Teams and your account manager can share additional information on these and which versions would suit your needs including the Teams Rooms equipment.

voip and microsoft experts

 

CLI – what options are there for the numbers I can present?  (Rarely in a call centre environment do you want to present the ddi of the agent.)

We activate SIP CLI flexibility, so during the set up we liaise with you and ask which telephone numbers you would like to be presented, this can be either the “bearer” (main number) or a DDI

 

Are you able to choose the data residency for data such as the transcribed calls (to be in the EU)?

Yes as with Microsoft 365 data residency is chosen at a tenant level as is set for the whole of your Microsoft 365 estate, adding Teams voice does not change this.

 

Can existing DDIs be moved over to the Teams phone system?

Yes, your existing numbers can be ported onto the direct routing for reams platform. This does depend on your contractual status and porting agreements being in place.

 

Can you transfer calls to people who exist in a different 365 tenant?  Plus, can you block premium rate, international and other expensive services?  Thank you.

Calls can be transferred out to any number however Teams to Teams tenant calls require both sides to have a valued voice licence.

 

Can the system cover hunt groups and overflow groups?

Yes, you can have hunt groups and these can overflow to additional groups or voicemails

 

Can you record calls?

Calls can be recorded via our call recording partner.

 

Hi all, are you recording the webinar?

Yes, you can view the recording HERE

 

Numbers – Are there any restrictions to numbers you can port into the teams PBX?  How many countries are there local numbers available in?

We can port in international numbers and we have the ability to offer new international DDI numbers. Due to the different porting process and some country restrictions please contact us to discuss this further to ensure that the porting agreements and number availability can be provided for the specific locations required.

 

Are there other additional costs? Call recording?  Office 365 add ons?

Call recording is sold as a separate system, we can provide you quotations for these systems based on your specific needs. In terms of the Microsoft 365 licences their is a single add on which can be added to any Business , E or F Plan.

 

Is the voice license on your system effectively a bolt-on to Microsoft 365 E3?

The system is an add on licence to Microsoft 365 subscription, there are several options for the bolt on depending on your use case and business type.

 

Are there any additional paid options for multi-tiered IVR

There are options available, please contact us to discuss this requirement further.

 

What if our organisation has the full MS 365 integration? Would we still be able to use Planet IT for this phone integration?

Planet IT’s Microsoft DRFT can be added to any existing Office 365 subscription

 

Are offices in different countries all covered under the same system and can we have different phone numbers for each different office location?

Yes

 

What is the teams mobile app version experience like?

The Mobile application of Teams has near feature parity with the desktop version and allows you to make a receive calls seamlessly while on the move.

Microsoft Teams Dial Screen

 

Mobile app – is there a separate Teams PBX app or is it built into the normal app?

The application used on the Mobile side of Teams is the same all that happens is the dial pad is added to the call screen.

 

Another way of asking that is what is required for your system by way of additional Microsoft licensing if we have MS 365 E3 licenses already?

If you already have a E/Business of F licence you need to add the Microsoft Voice licence, which is provided as part of the service this is then backed off by Gamma for the SBC and voice access

 

If I get a call to my mobile from someone dialling my company number rather than my mobile direct is there a way of ID’ing this?

The incoming call will be received via the Teams app and therefore will present as a “teams” call rather than a normal mobile call.

 

Can we configure automatic message for Unknown or Hidden number to say we’re not answering call from them?

Yes we can route the call to a message.

 

Does the caller get notified that the call will be transcribed? Do you foresee any privacy issues with this feature?

The caller does not get notified when the call is being transcribed, however there is no legal obligation to do so as it does not fall under call recording as its purely a record of the call and not a live recording. If you wish to record a call a user would be notified .

 

Are Microsoft Teams physical handsets available?

Yes you can get a range of physical devices that are Microsoft certified for Teams and your account manager can share additional information on these and which versions would suit your needs including the Teams Rooms equipment.

 

Are there published rates for international calls to landlines and mobiles?

A SIP international tariff is available, please contact your account manager.

 

Is it possible to pick up a call from a team members phone? When they are away from their desk?

Yes this is possible via either a quick pick up command or via delegation.

 

How do hardware desk phones integrate?

Microsoft Teams requires a Teams certified handset , we can provide you information of the ones currently on the market. Reach out to your Planet IT account manager for more information.

 

Can existing DDIs be moved over to the Teams phone system?

Yes, your existing numbers can be ported onto the direct routing for Teams platform. This does depend on your contractual status and porting agreements being in place. We require a customer letter of authority (CLoA)

 

Can you describe the process for arranging current numbers and DDI’s that are in use to be ported to Teams please?

Depending on your incumbent provider, we request that you complete a CLoA (customer letter of authority) and providing that a porting agreement is in place we simply port the numbers onto the direct routing endpoint.

 

Numbers – Are there any restrictions to numbers you can port into the teams PBX?  How many countries are there local numbers available in?

This is subject to the range required and the countries requested. Please contact your account manager to allow us to investigate this for you.

 

Are there other additional costs? Call recording?  Office 365 add-ons?

Please contact your account manager regarding call recording costs as this is costed based on the number of users required and whether you require just audio recordings or to capture screen sharing/meetings and chat

 

Are offices in different countries all covered under the same system and can we have different phone numbers for each different office location?

This is achievable, you can have one platform for all users and select different geographic telephone numbers.

 

Are there published rates for international calls to landlines and mobiles?

Yes, please contact your account manager for a SIP international rate card

 

Is it possible to pick up a call from a team members phone? When they are away from their desk?

Yes this is possible via either a quick pick up command or via delegation.

 

Is there a minimum requirement of broadband speed, as some users that live in rural or poor broadband areas might be affected?

2.5Mbps is the recommended minimum connection speed for a user on Microsoft Teams.

 

Can Teams be plugged into CRM systems for caller display?

Yes There are many API based integrations with CRM systems.

 

Is there an option for a reception console, like Mitel 5500, to have a real person filter/direct calls?

You can have an operator type handset if required, alternatively the receptionist can configure speed dials based on the users/ departments for ease of use and transferring

 

Looking for a technology partner?
Let’s talk