Exchange/Exchange Online – Top-10 Benefits

  1. Protect your sensitive data and inform users of internal compliance policies with Data Loss Prevention (DLP) capabilities: Keep your organization safe from users mistakenly sending sensitive information to unauthorized people. The new Exchange DLP features identify, monitor, and protect sensitive data through deep content analysis. Exchange offers built-in DLP policies based on regulatory standards such as PII and PCI, and is extensible to support other policies important to your business. Additionally, the new Policy Tips in Outlook inform users about policy violations before sensitive data is sent.
  2. Allow compliance officers to run In-Place eDiscovery across Exchange, SharePoint, and Lync – from a single interface: The ability to immutably retain and discover data across your organization is essential to ensuring internal and regulatory compliance. Allow your compliance officers to autonomously use the new eDiscovery Center to identify, hold, and analyze your organization’s data from Exchange, SharePoint, and Lync. And, the data always remains in-place, so you never have to manage a separate store of data. With the eDiscovery Center, you can reduce the cost of managing complex compliance needs, while ensuring you are prepared for the unexpected.
  3. Keep all of your important data in one place with Exchange archiving, large mailboxes, and retention policies: Empower your users with an in-place archive and large mailbox to allow them the flexibility to retain email in their primary mailbox, or to archive items. With flexible and powerful retention policies, you can take control of your storage and compliance demands – while keeping your users productive.
  4. Enable your users to collaborate on projects, get up to speed quickly on teams they join, and share information easily: Make it easier for your users to manage team and project communications. Allow users to see old communications on a project as soon as they join, have access to the current versions of their team documents, and access that information right from within Outlook. Your users will
    have powerful new tools to be productive on their teams and you will be able to
    manage information in the locations that this information was meant to be stored. Co-authoring, document storage and versioning is provided by SharePoint while messaging is handled by Exchange with a complete user experience within Outlook.
  5. Eliminate email threats before they reach your network: Exchange actively protects your communications with built-in defenses against email threats. Multi-layered anti-spam filtering comes with continuous updates to help guard against increasingly sophisticated spam and phishing threats, while multiple anti-malware engines work to protect your email data from viruses.
  6. Give your users an intuitive, touch-enabled inbox experience on just about any device: Enable your users to get more done from anywhere with an inbox that provides a clean and uncluttered experience, where the relevant and important information is optimized for different form-factors. The same thoughtful design in the Outlook desktop interface has been applied to both the browser and mobile interfaces.
  7. Move to the cloud on your terms with flexible options including Exchange hybrid deployment: Exchange provides you tools to move to the cloud on your terms – whether that’s onboarding to the cloud overnight or managing a hybrid deployment with mailboxes on-premises and online to meet your business needs. Provide your end users with a seamless experience including sharing calendars and scheduling meetings between on-premises and online users and limit user disruption when user mailboxes are smoothly moved across environments. Remain in control in the cloud by testing out upcoming enhancements with support for upgrade previews.
  8. Decrease the amount of time spent managing your messaging systems while maintaining control: Manage powerful capabilities including DLP, Apps for Outlook, and site mailboxes from the Exchange Administration Center – a single, easy-to-use, web-based administration interface. Role-based access control empowers your helpdesk and specialist users to perform specific tasks which are
    surfaced appropriately in the Exchange Administration Center – without requiring full administrative permissions. This streamlined and intuitive experience helps you manage Exchange efficiently, delegate tasks, and focus on driving your business forward.
  9. Customize Exchange by integrating relevant, web-based Apps for Office into Outlook and Outlook Web App: Help your users spend less time switching between apps and make their communications experience more powerful with an extension model that allows you to provide easy plugin access across both the rich client and web-based Outlook experiences. You can minimize complexity with single sign-on to multiple applications and securely give access designed to ensure only authorized individuals can use each approved application.
  10. Bring all of your contacts together in one place: People’s professional networks span many different places. You will have the ability to enable users to bring their contacts in from other networks so that they have all of their information in one place. Exchange will even find the same person across networks and consolidate their information into one contact card, avoiding duplication and multiple contact cards with different information.

Reference by


  1. Read the BSA “Software Management Guide.”
  2. Establish software management policies that protect computers from unlicensed software and educate employees.
  3. Use the tools on to inventory office software.
  4. Compare the number of software installations to the number of licenses and obtain any licenses needed for compliance.
  5. Schedule regular software audits to guard against piracy.




  1. Read the BSA “Guide to Software Management.”
  2. Establish office policies for purchasing software and respecting intellectual property rights.
  3. Explain to employees the importance of protecting computers from unlicensed software.
  4. Compare the number of software installations to the number of licenses.
  5. Obtain any licenses needed for compliance.
  6. Schedule regular software audits to guard against piracy.


10 Reasons Why It’s Important to be a Responsible Software User

10. Copying software undermines policies against taking company property.

9. Proper software management saves time and money, and makes a computer user more productive.

8. Unlicensed software is one of the prime sources of computer viruses that can destroy valuable data.

7. Unlicensed software is more likely to fail, leaving computers and their information useless.

6. You can expect no warranties or support for unlicensed software and you won’t have access to inexpensive upgrades.

5. The cost of software piracy settlements usually far outweighs the cost incurred by a company using legitimate software.

4. In some circumstances, you leave your organization vulnerable to raids and seizures of evidence, including computers, disk drives, and other equipment.

3. In 2002, BSA investigated more than 500 companies. In the past 11 years, BSA has recovered nearly $90 million in penalties from software pirates.

2. Software piracy can lead to stiff fines of up to $150,000 per copyright infringed and civil and criminal prosecutions.

And the number one reason you should ensure that the software you are using is compliant with U.S. Software Copyright Laws?

Software Piracy Is Theft!


Command For Macfee



Macfee Client install with Agent

“C:\Program Files\McAfee\Common Framework\CmdAgent.exe” /s

Macfee Uninstall Agent

“C:\Program Files\McAfee\Common Framework\FrmInst.exe” /remove=agent

Macfee Uninstall Client Setup

“C:\Program Files\McAfee\Common Framework\FrmInst.exe” /forceuninstall

Compare Windows 7 to Windows 8.1

Compare Windows 7 to Windows 8.1

Windows 7 Windows 8.1
The familiar desktop    
Works with a mouse and keyboard    
Works with Word, Excel, Outlook, and other familiar programs    
Built for touch PCs and tablets  
Apps from the Windows Store  
Mail, People, and other built-in apps  
Keep your settings and apps on all your PCs and devices  
Bing smart search to find things across the web, apps, and your PC  
Start screen with live updates  
Faster startup times  


Hangouts can now be enabled for domains using Google Apps Vault

Customers using Google Apps Vault can now activate the new Hangouts in the Admin console. An amendment has been added in the Admin console that allows you to activate the new Hangouts on acceptance of the terms. This amendment outlines the change in Vault functionality that will exist until we complete the roll out of full compatibility. You will still have eDiscovery and legal-hold capabilities for your on-the-record/history-on chats, but the retention-purge function will not be available. To agree to the amendment, please log into the Admin console, go to Apps, click on Talk/Hangouts, go to Advanced Settings, and click “Enable Hangouts”.

How to opt in

If you’d like to opt in after reviewing all the considerations above, follow two steps so that your users can get started with Hangouts:

1. opt in in the Admin console and    2. inform your users.

To opt in to the new Hangouts for everyone or for users in specific organizational units, do the following:

  1. Sign in to the Admin console.
  2. Find the Talk settings:
    • In the classic Admin console, click Settings > Talk.
    • In the new Admin console, click Google Apps > Talk/Hangouts > Advanced settings.
      (Which Admin console do I have?)
  3. In the Organizations section near the top of the page, select your domain or the organizational unit for which you want to configure settings.
  4. In the Google+ Hangouts section, select Enable the new Hangouts for this organizational unit.
  5. If you have Google Apps Vault, a dialog containing the Vault-Hangouts amendment appears. Read the amendment. Click I Accept if you accept the terms.
  6. In another dialog, read all the conditions and issues related to enabling the new Hangouts. If you’d like to continue, check the I have read and acknowledged the above box. Then click Continue to enable.

How to opt out after opting in

If you change your mind and want to back out of the new Hangouts for now, do the following:

  1. Sign in to the Admin console.
  2. Find the Talk settings:
    • In the classic Admin console, click Settings > Talk.
    • In the new Admin console, click Google Apps > Settings for Talk > Advanced settings.
      (Which Admin console do I have?)
  3. In the Organizations section near the top of the page, select your domain or the organizational unit for which you want to opt out of the new Hangouts.
  4. In the Google+ Hangouts section, select Do not enable the new Hangouts and keep my existing settings.


For more information:


Essential Tips For Securing BYOD And Mobile Access For Your Business

Giving your workforce anytime, anywhere access to corporate systems & data can help everyone to do a better job… but there are security risks.

Roll out a BYOD (Bring Your Own Device) initiative and you will see additional business benefits… along with additional security issues. So it pays to be prepared.

Mobile Security & BYOD For Dummies brought to you by Kaspersky Lab – brings you tips on strategy, policies and legal considerations – plus guidance on vital security technologies that can protect your business… and its reputation.


Get this guide and discover how to:

  • Deliver and manage a secure BYOD programme
  • Prevent costly legal and regulatory issues
  • Select technologies that protect your business

For mobile access programmes – and Bring Your Own Device (BYOD) initiatives – there’s no ‘one-size-fits-all’ approach. Mobile Security & BYOD For Dummies – brought to you by Kaspersky Lab – provides valuable tips to help your business consider its own unique requirements… and decide on the mobile security strategy that’s right for your business and its workforce.

In six concise chapters, this information-packed guide talks you through the benefits and the issues:

  1. Why mobile and BYOD?
  2. Malware, loss and other risks – now and in the future
  3. Knowing the legalities – so your business stays on the right side of the law
  4. Finely tuning your BYOD strategy, policy and guidelines
  5. Selecting security software – the ‘must have’ features
  6. Ten questions to help you refine your mobile strategy

Steps to Clear browsing history

Google Chrome

Steps to Clear your entire browsing history
  1. Click the Chrome Menu Chrome Menu on the browser Toolbar.
  2. Select Tools.
  3. Select Clear browsing data.
  4. In the dialog that appears, select the “Clear browsing history” checkbox.
  5. Use the menu at the top to select the amount of data you want to delete. Select beginning of time to clear your entire browsing history.
  6. Click Clear browsing data.

Internet Explorer

To delete your browsing history
  1. Open Internet Explorer by clicking the Start button Picture of the Start button. In the search box, type Internet Explorer, and then, in the list of results, click Internet Explorer.
  2. Click the Tools button Tools button, Point to Safety, and then click Delete browsing history. If you don’t want to delete the cookies and files associated with websites in your favorites list, select the Preserve Favorites website data check box.
  3. Select the check box next to each category of information you want to delete.
  4. Click Delete.
steps to clear cache
  1. Click Tools from the Internet Explorer menubar
  2. Click Internet Options
  3. Click the General tab
  4. Click the Delete Files button in the Temporary Internet files section
  5. If you still have a problem, repeat the steps above and restart the computer.


Clear the cache
  1. Open Mozilla Firefox.
  2. Click the Firefox button and then choose Options.
    • Note: If you’re using the menu bar, choose Tools and then Options instead.
  3. With the Options window now open, click the Privacy tab.
  4. In the History area, click the clear your recent history link.
    • Tip: If you don’t see that link, change the Firefox will: option to Remember history. You can change it back to your custom setting when you’re done.
  5. In the Clear Recent History window that appears, set the Time range to clear: to Everything.
  6. In the list at the bottom of the window, uncheck everything except for Cache.
    • Note: If you wish to clear other kinds of stored data, feel free to check the appropriate boxes. They will be cleared with the cache in the next step.
  7. Click on the Clear Now button.
  8. When the Clear Recent History window disappears, all of the files saved (cached) from your Internet browsing activities in Firefox will have been removed.


steps to clear cache
  1. Click Edit from the Opera Menu bar
  2. Click Preferences from the File menu
  3. Click the History and Cache menu
  4. Click Cache
  5. Click ok to close the Preferences menu
  6. Please refer to the Opera support page on Web caching for more detailed information
  1. From the Opera Menu, select Settings, and then Delete Private Data… .
  2. In the dialog box that opens, select the items you want to clear, and then click Delete


  1. From the Safari Menu, select Reset Safari… .
  2. From the menu, select the items you want to reset, and then click Reset. As of Safari 5.1, Remove all website data covers both cookies and cache.
  1. Open your Safari 4 Web browser.
  2. Click on Edit in your Safari Menu, located at the top of your browser window.
  3. A drop-down   will now appear. Choose the option labeled Reset Safari….
  4. A warning dialog will now appear detailing the items that will be removed. By default, all items within this window are checked with the exception of Reset Top Sites and Remove all webpage preview images.
  5. Ensure that only the items that you wish to reset are checked.
  6. Click the button on the dialog labeled Reset to complete the process.
  7. Your Safari browser will now restart automatically.