Configure Cisco Anyconnect VPN using real SSL certificates instead of selfsigned. This configuratiobn was done on a Cisco C1111-x router with IOS-XE 16.9.3
The 3CX PBX does not have a built in Calling Class of Service feature so, by default, anything a person dials is sent straight out to the carrier. This means that if you want to restrict calls to certain numbers you have to do it using groups and outbound rules. This is how you can set up classes of service to restrict dialling to local, mobile, national or international calls.
Organisations who currently have Azure resources in the cloud either hybrid or fully migrated can now replace their Remote Desktop Server. Windows Virtual Desktop (WVD) allows users to connect to session hosts similar to RDS but have a ‘desktop’ experience. Previously when connecting to an RDS server, users were actually receiving a ‘server’ experience as RDS runs on a Windows Server 2016/2019 system.
Microsoft now makes it easy for you to add Multi-Factor Authentication (MFA) to your Windows Remote Desktop Server using their Azure MFA service. Here is how to set it up.
Here is a simple way to use a QR Code and Google Forms to set up a free, contactless sign-in process for visitors to your office.
Good Passwords are no longer enough to protect your data any more. With Phishing attacks and other scams on rise, it is unfortunately common that at some stage, someone in your organisation is going to give up their username and password. Multi-Factor Authentication (MFA) can help prevent that from becoming a disaster.
Are you stuck working from home and need to configure Azure P2S VPN to gain access to the infrastructure hosted in your business cloud? The good news is that you absolutely can do this, using Azure’s P2S VPN service. This post will take your through 25 comprehensive and easy steps that will help you set it up and enjoy getting work done a lot easier.
This article is a strictly professional overview of the current red-hot cloud collaboration and workforce collaboration environment, and our recommendation for the five things leaders need to address to ensure IT security and business continuity during and beyond COVID-19 crisis.