Category: Skype for Business

June 14th, 2019 by UC Now Skype/Teams News Feed
Hello Readers, hope you’re well. A new batch of cool features landed in Microsoft Teams yesterday. Announcements – make an announcement that stands out from the rest of the conversations and really be heard Message Reactions – now you can like, love, laugh and more with additional message reactions Message actions – Conduct a Polly […]

Posted in Skype for Business

June 13th, 2019 by UC Now Skype/Teams News Feed

First published on TECHNET on Jun 20, 2018
Recently, I come across a particular scenario where Get-csPoolUpgradeReadinessState was showing as READY and Front-End Services were started across all Front-Ends, but the TotalActiveFrontEnds showed a number that was different from the total active Front-Ends in the Pool.

You will notice that UpgradeDomain3 has 1 Front-End Server associated, but then the Total Active Front-Ends is Zero. You will also notice that that the total Front-Ends ( in summary) only shows a 2  Active Front-Ends Servers.

Interestingly, Get-csPoolFabricState was not throwing any errors or warnings !!!

To troubleshoot the issue, we started by First checking, if the Front-End Server was failed-over and so we tried to Failback, but to our surprise, the server was not in a failed-over state, and hence Failback was not working ( expected).

Next, we started investigating by checking Windows Fabric Logs from C:Program DataWindows FabricLogs and then running a CLS Logging using a scenario called PowerShell.

In the plain-text log, we noticed the following

TL_WARN(TF_HADR) [LYNCPOOL01LYNCENT03]8554.13B2C::06/18/2018-23:57:49.112.0000200D (PowerShell,FrontEndState.ReadPerfCounters:poolupgradereadinessstate.cs(568)) (000000000261B13F ) FE is not connected to Fabric Pool Manager according to perf counter.

Based on this we decided to follow a blog entry, Get-CsPoolUpgradeReadinessState showing NOT READY or BUSY and found that the server was indeed missing the permissions for RTC Server Local Group

So we first added the Local Group

And then updated the permissions to Full Control, and rebooted the server. Once the server was back online and services were running, we noticed that the output for Get-csPoolUpgradeReadinessState was showing Total Active Front-Ends as 3

Attention to detail is indeed important when patching a pool with multiple servers, to ensure that the pools are reporting healthy when indeed, there could be an issue with one or more servers reporting its state.

Posted in Skype for Business

June 13th, 2019 by UC Now Skype/Teams News Feed

Schedule call routing is a useful service that will prohibit calls from going to places such as hunt groups and call centers when there is predictably nobody staffing them. With scheduled call routing you can avoid those after hours calls heading to an empty group. Within the service you should know where you want the calls to go if they're not going to the business hours service.

Posted in Skype for Business

June 13th, 2019 by UC Now Skype/Teams News Feed

Schedule call routing is a useful service that will prohibit calls from going to places such as hunt groups and call centers when there is predictably nobody staffing them. With scheduled call routing you can avoid those after hours calls heading to an empty group. Within the service you should know where you want the calls to go if they're not going to the business hours service.

Posted in Skype for Business

June 13th, 2019 by UC Now Skype/Teams News Feed

First published on TECHNET on Jan 17, 2018
In Skype for Business Server 2015, we added functionality, where contents flushed by Lyss (EVENT ID 32089) is automatically imported every 30 minutes. This configuration can be enabled or disabled by using Set-CsStorageServiceConfiguration and when the contents are successfully imported, we would see EVENT ID 32097 and if the import fails, EVENT ID 32099 would be written to disk

        Log Name:      Lync Server

        Source:        LS Storage Service

        Event ID:      32097



        One or more files were automatically imported back into Storage Service successfully.


        The following automatic flushed file import success events occurred.

        #CTX#{ctx:{traceId:10001, activityId:"a35a9699-53fb-440d-bbd4-058729dd284f"}}#CTX# File:
        \contoso.comLyncRootDFSRTCShare1-WebServices-1StorageServiceDataExport 2014

        0625SKYPEFE01.contoso.com1c5de83aaf4e5d41a767576ed27f333f__0.xml, items imported: 249


        Cause: A background task will look for eligible flushed files from the web service file store or from       the local front end which were created at least a certain time ago and import back into Storage             Service. These items could have been flushed out from the DB due to high DB size or from
      manually invoking pool failover or flushing cmdlets.


        No action needed.

        Log Name: Lync Server
        Source: LS Storage Service  
        Event ID: 32099
        Attempt to automatically import a flushed file back into Storage Service encountered error.
        The following automatic flushed file import error events occurred.
        #CTX#{ctx:{traceId:10001, activityId:"8454c5d4-57f6-437a-9cf7-46fc15960492"}}#CTX# File:
\contoso.comLyncRootDFSRTCShare1-WebServices-1StorageServiceDataExport 2014

      0625SKYPEFE01.contoso.com640daf8d97b5199b82663737356b525__14.xml , items deserialized 3, items       failing re-import: 3

      #CTX#{ctx:{traceId:10001, activityId:"8454c5d4-57f6-437a-9cf7-46fc15960492"}}#CTX# File:
\contoso.comLyncRootDFSRTCShare1-WebServices-1StorageServiceDataExport 2014
, items deserialized 1, items
        failing re-import: 1

      #CTX#{ctx:{traceId:10001, activityId:"8454c5d4-57f6-437a-9cf7-46fc15960492"}}#CTX# File: 
\contoso.comLyncRootDFSRTCShare1-WebServices-1StorageServiceDataExport 2014
, items deserialized 2, items       failing re-import: 2
        Cause: Bad input data, or error calling Storage Service, or other errors.
        Please look at event details and use the correlation ID to view corresponding traces to resolve the error.

To investigate, I would get started with the XML files. First, I would simply view them in a Browser or another application to view the contents. A quick visual spot check could provide information, about the failures

<?xml version="1.0"?>
-<LyssQueueItem Version="1" xmlns="">
+<ItemQueue ItemQueueID="0282d738-9468-e711-8108-0050569e79b5" GroupID="38e63176-1723-5d4d-8a40-ff2e2c436899">
+<ItemQueue ItemQueueID="e081e54a-9468-e711-8108-0050569e79b6" GroupID="38e63176-1723-5d4d-8a40-ff2e2c436899">
+<ItemQueue ItemQueueID="82c21bcb-9768-e711-8108-0050569e79b6" GroupID="38e63176-1723-5d4d-8a40-ff2e2c436899">
+<ItemQueue ItemQueueID="3cd27fce-9a68-e711-8108-0050569e79b6" GroupID="38e63176-1723-5d4d-8a40-ff2e2c436899">
+<ItemQueue ItemQueueID="48b5359a-a368-e711-8108-0050569e79b6" GroupID="38e63176-1723-5d4d-8a40-ff2e2c436899">
+<ItemQueue ItemQueueID="44bb9767-a768-e711-8108-0050569e79b6" GroupID="38e63176-1723-5d4d-8a40-ff2e2c436899">
+<ItemQueue ItemQueueID="8b35a1e5-be68-e711-8108-0050569e79b6" GroupID="38e63176-1723-5d4d-8a40-ff2e2c436899">
+<ItemQueue ItemQueueID="4ff14355-c068-e711-8108-0050569e79b6" GroupID="38e63176-1723-5d4d-8a40-ff2e2c436899">
+<ItemQueue ItemQueueID="b6e98870-c168-e711-8108-0050569e79b6" GroupID="38e63176-1723-5d4d-8a40-ff2e2c436899">
+<ItemQueue ItemQueueID="c0204b47-c568-e711-8108-0050569e79b6" GroupID="38e63176-1723-5d4d-8a40-ff2e2c436899">
+<ItemQueue ItemQueueID="6c59d707-c668-e711-8108-0050569e79b6" GroupID="38e63176-1723-5d4d-8a40-ff2e2c436899">
+<ItemQueue ItemQueueID="90482b96-c768-e711-8108-0050569e79b6" GroupID="38e63176-1723-5d4d-8a40-ff2e2c436899">
+<ItemQueue ItemQueueID="6c76a50e-ca68-e711-8108-0050569e79b6" GroupID="38e63176-1723-5d4d-8a40-ff2e2c436899">

Here we can count the number of items as 13 items, and may be able to investigate individually. Let's say, if there were many items, we would want to not manually count the errors and then manually check what’s wrong.

So we can run use PowerShell to help us out, this can be accomplished by running

[XML] $a=Get-Content '.LYSS_Sample.XML'


Disclaimer: Importing a XML file in PowerShell can be very resource extensive, and it highly recommended to not be performed on a LYNC or Skype for Business Server

Next, we can look into the characteristics about the issue, simply by running the below script. We can see that the content in this XML file is all tagged as Item Status 3 with a particular AdapterID.

$a.LyssQueueItem.QueueItems.ItemQueue | ft ItemStatus,AdapterID

ItemStatus AdapterID
---------- ---------
5          cde2bace-f515-444d-a3f1-858a7fc8728f
5          cde2bace-f515-444d-a3f1-858a7fc8728f
5          cde2bace-f515-444d-a3f1-858a7fc8728f
5          cde2bace-f515-444d-a3f1-858a7fc8728f
5          cde2bace-f515-444d-a3f1-858a7fc8728f
5          cde2bace-f515-444d-a3f1-858a7fc8728f
5          cde2bace-f515-444d-a3f1-858a7fc8728f
5          cde2bace-f515-444d-a3f1-858a7fc8728f
5          cde2bace-f515-444d-a3f1-858a7fc8728f
5          cde2bace-f515-444d-a3f1-858a7fc8728f
5          cde2bace-f515-444d-a3f1-858a7fc8728f
5          cde2bace-f515-444d-a3f1-858a7fc8728f
5          cde2bace-f515-444d-a3f1-858a7fc8728f

If all the items have ItemStatus 5 and the AdapterID is cde2bace-f515-444d-a3f1-858a7fc8728f, and you have users that are enabled for Skype for Business, but have mailboxes hosted in an email system that’s either non-Microsoft Solution ( EWS doesn’t exist) or doesn’t allow for OAuth ( Exchange Server 2010 and earlier) then these messages mostly would be Server-Side Conversation History for the account, but conversations cannot be saved. If the goal is not to move the mailbox to Exchange Server 2013 or higher, then these files can be ignored. (Updated 08-March 2018) In-order to prevent more data to be written to the file-share, it is recommended that you use New-csClientPolicy to create a new policy for these users and  then disable Server-Side Conversation History for the users.

$a.LyssQueueItem.QueueItems.ItemQueue | Group-Object AdapterID | FT Count, Name
Count       Name
-----       ----
60         cde2bace-f515-444d-a3f1-858a7fc8728f
12         36AA818F-00BB-43BC-88E7-6840ECA732C6
5          0947BCF3-7D50-40A7-9E3A-F07B9DC4CEF1

If the name matches "CDE2BACE-F515-444D-A3F1-858A7FC8728F" you might want to follow instructions The LCSLog SQL Database is not logging any archiving content .
If the name matches "36AA818F-00BB-43BC-88E7-6840ECA732C6" it could be possible that you also have issue with EVENT ID 56208 – Resolving Issues with CDR Throttling
If the name matches “0947BCF3-7D50-40A7-9E3A-F07B9DC4CEF1”, if could be possible that you have issues with EVENT ID 56416 – Failed to post QoE report to External Consumer

If there are more than 2,000 items in any XML file ( shouldn’t typically happen), then it could happen that the Auto-Import functionality may fail parsing the file. In such a case, we would recommend to use ImportStorageServiceData.exe or reach out to Microsoft Premier Support

If the contents of the folder have data older than your retention period ( CDR, QoE, IM&WebConf retention) say for example the XML files are generated 12 months ago, but the retention periods are 90 days, then it would be safe to delete the XML files from  >90 days ago.

As always, when in doubt, we request you to open a Service Request with Microsoft Premier Support

Posted in Skype for Business

June 12th, 2019 by UC Now Skype/Teams News Feed

Want to ensure your Office 365 environment is as secure as possible? Watch our free webinar “All Access Tour: Office 365 Security and Governance Features” for key tips and tricks!

Note: The following is a recap of Susie Adams’ session at Shift Happens Conference 2019. 

Security is changing rapidly across all industries. The rise of mobile devices and easily accessible cloud platforms has made protecting data substantially more complex than it was ten or even five years ago. So, how can you manage data protection while transitioning to the cloud? Let’s jump into it.

A common mistake many organizations make is trying to maintain aging technology. It has the benefit of being familiar, sure, but it also creates barriers to furthering your company’s security practices.

Today, we have the benefit of intelligent protection against threats. We can have settings that notify us, help us analyze the resulting data effectively, and act on it swiftly.

This isn’t just convenient–it’s essential. It used to be the case that an organization’s network perimeter would detect and repel attempted data breaches without much issue. However, the evolving security perimeter has shifted in such a way that data has now moved out of the network and its protections. People take their work home on non-managed devices, engage in shadow cloud practices (using Google Docs for work, for instance), and so on.

identity is the new firewall, devices are the new perimeter, and assuming breach is the new security model.

That’s right; assuming that a breach is happening at any given moment is key. This doesn’t mean you should hit the alarm every five seconds, but you should constantly evaluate and test your security. It’s also worth delving into your Office 365 settings to see what capabilities the cloud can afford you to better secure your environment.

What Goes Into Creating a Secure Modern Enterprise?

A secure modern enterprise is resilient to threats because it’s aligned to business objectives and the current threat environment. It should take into account:

  • Identity. It embraces identity as the primary firewall and protects identity systems, admins, and credentials as top priorities.
  • Apps and Data. It aligns security investments with business priorities. This includes identifying and securing communications, data, and applications.
  • Infrastructure. It operates on a modern platform and uses cloud intelligence to detect and remediate both vulnerabilities and attacks.
  • Devices. Preferably, it only allows trusted devices–with security measures in place–to access company data.

Microsoft Office 365 roadmap resources

Microsoft’s Modernization Roadmap

Susan also laid out Microsoft’s modernization roadmap to help illustrate what the process of upgrading your data security in the cloud might look like. The first steps are:

  • Designating data that needs to be retired, right-sized, or eliminated (~30%)
  • Determining the data that can be used or converted to a SaaS (first or third-party) solution (~15%)

What’s left is then exposed to existing SaaS/PaaS solutions before being:

  • Converted to Azure PaaS solutions
  • Optimized for (and subsequently moved to an) Azure IaaS VM
  • Left unchanged and lift n’ shifted to an IaaS

Struggling with data security in the cloud? Check out this post:
Click To Tweet

How quickly that remaining data is converted or optimized is determined like so:

First to Move (~35%)

  • Basic web apps
  • Advanced portals
  • Any new solutions
  • Any re-architected solutions

Next to Move (~10%)

  • High I/O OLTP (Online Transactional Processing)
  • Regulatory and high business impact

Hard or Costly to Move (~5%)

  • HVA systems
  • PK3 systems
  • Legacy source control

And after all that, only about 5% will remain on-premises.

As you can see above, modernizing your company’s approach to modernization in the cloud doesn’t have to be needlessly convoluted. The move the cloud is always changing and innovating, so be sure to prepare for a long, constantly evolving journey!

Keep up with all the session from Shift Happens Conference by subscribing to our blog!

Posted in Skype for Business

June 12th, 2019 by UC Now Skype/Teams News Feed


About 7-8 years ago I started on my official IT education with instructor lead online classes. One of the first things our teacher said already back then, was that Twitter was a good source of learning/information within the IT industry. This sounded interesting, so I dug up the password for my dusty Twitter account and took a look at some accounts he suggested to follow. This looked interesting.

As I carried on my education and day to day work I kinda forgot about this Twitter thing for a while. I got into a new job and remembered that Twitter was there.  I started to follow people focusing on Skype for Business, and this was what my new role was about. Tried to reply if I had anything to contribute, but I felt I was not as knowledgable as others.  I figured out I would start blogging about Skype for Business related issues I solved at work and see what would happen. Shortly after I lost my job due to the companies earnings were to low, so I put my blog on the shelf to collect dust. For about a year I had a non-relevant job to what I was educated to do. After getting into IT again after a year “off”, I had started to learn PowerShell and starting to write scripts that eased my co-workers day. I started to blog again, logged on to Twitter and even found a UC related group on “Facebook at Work”. In the work-related group, I started to share what I was doing and started to get good feedback on what I did. This felt rewarding and made me want to do more. I started to answer questions on Microsoft Tech Community also.  I was somewhat active, but not that emerged. Apparently, I was a bit more active than I thought, as I was awarded as the member of the week at Tech Community. This made me happy. Did my actions help others?  It was good to get a confirmation like this.

It was first when I started at my current employer 2 years ago I fully got into doing community work. I started blogging weekly and being very active on Twitter. This helped me grow my knowledge at work and help others on the way. If I found a solution at work, I blogged about this. This way I learned it even better, as you need to explain it very detailed and on a simpler level.

After a couple of months, I got to go to my first conference after starting to be active in the community. I finally was going to meet all these knowledgable people I had interacted with on Twitter. How should I go about? I’m an introvert and thought it sounded a bit scary to meet them face to face. What if they see through me and notice I’m not that knowledgable as I appear online? I must admit it was a leap to go from behind the keyboard and saying hi in real life. But it turned out that they also were just regular down to earth people! I had some great conversations at this conference and connected well.

Throughout the next year, I started feeling more confident and got more deep knowledge on the way. I remember a Twitter thread where several MVPs and someone from the Skype for Business product group was discussing an issue. Who found the answer? I did! This was the first time I didn’t feel like an imposter. After a while, I even got my first speaking gig and felt great about it even if it was way more out of my comfort zone than I had ever been. Up to and during the conference I got really great support from the community and my co-workers. This was a good rush, to stand in front of people and share my knowledge.

After some months I spoke at a conference in Singapore and after that attended Microsoft Ignite in Orlando. I meet the same people that I had to meet at other conferences. After the conferences were done for the day, the same group of people usually found something social to do. It was fun hanging out with these people! Now, after several more conferences, I still look forward to meeting everyone. I consider many of them my friends. Who would have thought community interaction was this fun? My career has grown because of this, and I have even grown as a person.

So what’s next? I try to focus on helping others in their way to achieving the same. If you see someone maybe with almost none followers on twitter post a blog about something, comment with some positive things you have to say about their work. This means the world to someone when you are starting out. It for sure did that to me. Also when you’re at a conference and see someone standing alone, go over and say hi. Remember how scary it was for you the first time. You always have something to talk about, since you both are at the same conference.

To round this blog post off, reach out to me on Twitter if you have any questions or need advice. I’m happy to help!

Posted in Skype for Business

June 12th, 2019 by UC Now Skype/Teams News Feed
What are priority notifications? This feature allows a user to mark a chat message in Teams as “Urgent”. Unlike regular “important” messages, Urgent Messages (also known as “priority notifications”) notify users repeatedly for a period of 20 minutes or until messages are picked up and read by the recipient, maximizing the likelihood that the message is picked up and acted upon in a timely manner. How to enable? IT Admins can manage this feature as part of messaging policies in Teams.

Posted in Skype for Business

June 11th, 2019 by UC Now Skype/Teams News Feed

We have another update to the Office 2013-based Skype for Business client. Our last update was May, and this one (Kb 4464593) takes us from 15.0.5137.1000 to 15.0.5145.1001.

What’s Fixed

  • Kb 4505833 Skype for Business 2015 (Lync 2013) becomes unresponsive when you join a meeting with many participants
  • Kb 4507057 Skype for Business crashes at sign-in after applying the May 7, 2019 update
  • Improves translations for multiple language versions of Skype for Business 2015 (Lync 2013).

What’s New / Changed

Nothing documented.

Known Issues

Nothing documented.


It’s all good if you’ve been diligent in your patching.

If however your patching isn’t to current you’ll need to check you have *all* of these pre-req’s. The Office 2013 SP1 requirement still applies if you’re using Outlook 2010. (Lync 2013 in all of its flavours – e.g. Lync Basic – is still a component of Office 2013).



Current Version


Update for Office 2013 (KB3054853) (NOTE 1 BELOW) 1.0 9 June 2015
LyncHelpLoc (kb3191937) 1.0 22 May 2017
Microsoft Office 2013 Language Pack Service Pack 1 (KB2817427) 1.0 13 February 2014

NOTE1: “You do not have to apply update KB3054853 if you applied the April 14, 2015, update (KB2889923) or the May 12, 2015, security update (KB3039779) for Lync 2013 (Skype for Business)”


This is the client fix itself:

  • x86 (lync2013-kb4464593-fullfile-x86-glb.exe)
  • x64 (lync2013-kb4464593-fullfile-x64-glb.exe)


To come.

Before / After



To come To come

Revision History

12th June 2019: This is the initial post.


– G.

Posted in Skype for Business

June 11th, 2019 by UC Now Skype/Teams News Feed

Tired of haphazard data in your Office 365 environment? Check out our free webinar “7 Crucial Office 365 Strategies To Contain Sprawl And Keep Data Safe!

Have you ever opened your Outlook app and thought, “Wow, how did I receive 1,000 emails today?” or “Where did I go wrong to have this much clutter in my mailbox?” You’re not the only one. A full mailbox and clutter are a hassle for employees regardless of industry or organization. Here are some tips to organize and avoid mountains of unread emails and increase your productivity in the process.

How to Determine the Size of Your Mailbox

Have you been getting alerts warning you that your mailbox is getting full but don’t know how full? Figuring out exactly how much space you have left can certainly be a little confusing. To find out, you’ll need to go to Mail Inbox View > Folder > Folder Properties > Folder Size.

Unfortunately, it’ll only appear in kilobytes, so to estimate the megabytes you’ll need to move the decimal over three spots. In the example above it looks like this user has a whopping 1376.6 MB of data. Yikes!

How to Manage Storage When Your Outlook Mailbox is Full

Once you know that your mailbox is at capacity, it’s probably time to start cleaning it up. Luckily, Microsoft provides a Mailbox Cleanup tool in Outlook that makes it easy to cut down on the amount of email you’ve accumulated. You can find it by navigating to File > Tools > Mailbox Cleanup.

Once you’re in Mailbox Cleanup you will be able to:

  • Archive items by using AutoArchive
  • View the total size of your mailbox and individual folders
  • Find items older than a certain date or larger than a certain size
  • And more!

How to Prevent Your Outlook Mailbox from Getting Full

Once you’ve got your mailbox cleaned up, you’ll want to keep it that way! Some ways you can prevent your mailbox from being cluttered include:

  • Archive older items. Put any items you want to keep in an archive to free up space. This will also make them easier to surface later.
  • Empty the “Deleted Items” folder. Make sure you delete the “Deleted Items” folder frequently so it doesn’t accumulate over time.
  • Empty the “Junk Email” folder. Just like with emptying the “Deleted Items” folder, this will free up space in your Outlook mailbox for the messages you actually want.
  • Store attachments outside your mailbox. Surprisingly, attachments can take up a lot of space in your mailbox. Save them in a team site or OneDrive to free up valuable room.

How to Stop Outlook from Auto-Deleting Emails

Outlook will sometimes automatically clear emails and send them to the Deleted Items folder without you knowing. To prevent this from happening, you’ll want to stop Outlook from auto-deleting emails in the Deleted Items folder.

You can do this by going to File > Options > Advanced and unchecking the “Empty deleted items folders when exiting Outlook” option in the Outlook start and exit section.

Use Other Apps to Avoid Clutter in Outlook

One of the simplest ways to avoid clutter in Outlook is to get out of the app and try using Microsoft Teams more often! Teams can help replace a lot of the messaging and clutter associated with Outlook and makes day-to-day collaboration with colleagues more efficient.

As with most things, the less clutter there is, the more organized you’ll be. Email is no exception. Being on top of your emails and making sure everything is being properly managed and stored will save you plenty of headaches in the long run.

Have any other questions related to Outlook (how to increase your Outlook mailbox size, etc.)? Feel free to leave a comment below!

Want more Outlook management tips? Be sure to subscribe to our blog!

Posted in Skype for Business