Insights as a Service episode:

16. What Teams Phone Lacks

16. What Teams Phone Lacks

Introduction

Not sure whether Teams Phone is the fit for your clients? Wondering how to scope it? In this episode, Brendan & Nick walk through the features, breaking each section into small digestible bits with just a hint of DJ horn.

We also wrote THE book on Teams Phone. The eBook will help you to scope, design, provision, and support Teams Phone with Confidence. Check it out the Teams Calling eBook here

Timestamps:

  • 0:00 Teams Phone episode intro
  • 2:10 Can Teams Phone make and receive calls?
  • 2:30 Can you transfer calls with Teams Phone?
  • 3:35 Can you have hold music on Teams Phone?
  • 4:50 Customised caller ID options in Teams Phone
  • 7:15 Teams Phone voicemail to email transcripts
  • 7:40 Save money with lowest cost routing on Teams Phone
  • 9:00 Teams Phone mobility
  • 9:56 Call groups in Teams Phone
  • 10:40 Call queues in Teams Phone
  • 12:11 Time of day rules in Teams Phone
  • 13:50 The Teams Phone Auto attendant/IVR
  • 17:44 Call monitoring in Teams Phone
  • 19:40 Can you record calls with Teams Phone
  • 21:00 Teams Phone integrations
  • 23:35 Physical handsets with Teams Phone
  • 25:50 Support for the Teams Phone environment
  • 28:12 How much does Teams Phone cost?
  • 31:40 How MSPs can add value with Teams Phone

Recent Posts

3CX Small Business – Multi-Tenant

For small businesses, 3CX SMB is the smart choice – a fully-managed, cost-effective PBX that covers all the essentials like voicemail, call queues, and digital receptionists. Perfect for teams of up to 10 users who don’t need advanced features or deep integrations.

Read More »

Lightwire Threat Feed Service

Under our new Lightwire Threat Feed Service (LTFS), we’ve kicked off by adding two key services from the National Cyber Security Centre (NCSC); Malware Free Networks (MFN) and the Phishing Disruption Service (PDS).

Read More »

Pulse Detect – Public Port Scanning

Pulse Detect provides clear visibility into publicly available vulnerability data associated with your infrastructure — including open ports and known Common Vulnerabilities and Exposures (CVEs) linked to your public IPs. This is the same type of information cyber adversaries actively seek out.

Read More »

Sign up for our Newsletter

Join over 2000+ customers who stay up to date with resources, articles, and sometimes controversial industry insights.