Skip to main content

Office 365 Information and Resources


Office 365 Getting Started
Overview:
  • General Overview | video 
  • Part 1: Connecting with people and information in new ways | video  
  • Part 2: Scheduling and running meetings with ease | video  
  • Part 3: Collaborating on documents and sharing business information | video
Tour for Users:
  • Chapter 1: Welcome to Office 365 | video 
  • Chapter 2: Email and more | video 
  • Chapter 3: Collaborate with Team Sites | video 
  • Chapter 4: Microsoft Office and Office Web Apps | video 
  • Chapter 5: Communicate now with Lync | video
Tour for Administrators:
  • Office 365 for Enterprises: The Admin Experience | video


Office 365 Information and Resources
Portal:
Provides a “one-stop-shop” access to the Office 365 features (manage your profile, change your password, download and install required components, navigate to OWA via Outlook link, navigate to SharePoint via Team Site link).

Exchange Online:
Exchange Online offers cloud-based email, calendar, and contacts. With Exchange Online, you run your email on our globally-redundant servers, protected by built-in antivirus and anti-spam filters and backed by unlimited, IT-level phone support 24 hours a day, seven days a week in your local language.

SharePoint Online:
Keep teams in sync. SharePoint Online gives you a central place to share documents and information. Designed to work with familiar Office applications, SharePoint lets you work together on proposals and projects in real-time because you have access to the documents and information you need from virtually anywhere.
  • SharePoint Online URL | (https://[something].sharepoint.com - depends on your domain) 
  • Getting started with SharePoint Online | Online Help
  • Basic tasks in SharePoint Online | Online Help

Lync Online:
Lync Online is a next-generation cloud communications service that connects people in new ways from anywhere by using presence, instant messaging, PC-to-PC calling, and rich online meetings with audio, video, and web conferencing.

Comments

Popular posts from this blog

Updating computer's AD Security Group membership without rebooting

I found the following to be very useful - From the elevated command prompt execute “ klist –li 0x3e7 ” to view the logon session of the computer account . To purge them, simply execute “ klist –li 0x3e7 purge ”. A typical use case might involve targeting GPOs based on computer's group membership. When you add computer to the group in order to test the application of policies you can reboot it or, alternatively, run the above mentioned to clear logon sessions, then do “ gpupdate /force ” and check. In a spirit of giving credit where credit is due, I found a few references to this, but the one I learned it from was  http://setspn.blogspot.com/2010/10/updating-servers-security-group.html

WordPress displays weird characters

Sometimes after a database conversion (e.g. from MySQL to MariaDB) or due to encoding issues a situation might arise when WordPress is showing weird characters. A quick way of remedying the situation would involve examining the pages to discover a pattern (what characters are being substituted, in the example below the apostrophe was replaced by  ’ ) then running an queries against the database to reverse the effect. Here's a quick example (common tables that store content): UPDATE  wp_posts  SET  post_content =  REPLACE (post_content,  'Â' ,  '' )      UPDATE  wp_posts  SET  post_content =  REPLACE (post_content,  '’' ,  "'" )      UPDATE  wp_postmeta  SET  meta_value =  REPLACE (meta_value,  'Â' ,  '' )      UPDATE  wp_postmeta  SET  meta_value =  REPLACE (me...
  AI Agents as Trusted IoT/Software Defined Devices 🤖 Your Newest Endpoint Isn’t a Laptop; It’s an AI Agent. Are You Ready to Secure It? Dive into the next frontier of cybersecurity. Autonomous AI agents are no longer just code; they are powerful actors in our digital ecosystems. Treating them as simple software leaves a massive security gap. Our latest report introduces a new paradigm: The AI Agent as a Software-Defined Device. Discover the essential framework for securing the agentic future: ➡️ The Agent-as-Device Model: Learn why abstracting agents as software-defined devices, similar to IoT endpoints, is the key to managing their complexity and risk. Secure the “hardware” (host), “software” (agent logic), and “network” (communications). ➡️ A Digital Passport for AI: Move beyond static API keys. Explore how Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs) create a cryptographic root of trust, giving every agent a verifiable identity and provable permissions. ➡️...