top of page
  • Linkedin
  • Facebook

Frost support business with critical recovery of IT applications

  • markarthered
  • Mar 4
  • 1 min read

Updated: Mar 28

Recently, we were approached by an agricultural business facing a significant challenge, that was seriously impacting their operations. They needed urgent support to resolve the issue as quickly as possible.


Frost support agricultural business with recovery of IT applications including Microsoft 365


๐…๐š๐œ๐ข๐ง๐ ย ๐›๐ฎ๐ฌ๐ข๐ง๐ž๐ฌ๐ฌย ๐๐ข๐ฌ๐ซ๐ฎ๐ฉ๐ญ๐ข๐จ๐ง๐ฌย ๐๐ฎ๐žย ๐ญ๐จย ๐›๐ž๐ข๐ง๐ ย ๐ฎ๐ง๐š๐›๐ฅ๐žย ๐ญ๐จย ๐ฌ๐ž๐ญย ๐ฎ๐ฉย ๐š๐ฉ๐ฉ๐ฅ๐ข๐œ๐š๐ญ๐ข๐จ๐ง๐ฌย ๐จ๐งย ๐ญ๐ก๐žย ๐ง๐ž๐ฐย 

๐๐ž๐ฏ๐ข๐œ๐ž๐ฌย 

The business has recently replaced its ageing desktops with new devices to support the business moving forward. However, they encountered obstacles, such as being unable to retrieve the original system administration details and access codes required to manage the Microsoft 365 environment due to the IT provider not supporting the environment and a loss of knowledge and staff.


While they could still access Microsoft 365 applications on their old laptops, these devices were no longer suitable for supporting and future-proofing the business.


๐Œ๐ž๐ž๐ญ๐ข๐ง๐ ย ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญโ€™๐ฌ ๐œ๐จ๐ฆ๐ฉ๐ฅ๐ข๐š๐ง๐œ๐žย ๐š๐ง๐ย ๐ ๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐žย ๐ฏ๐ž๐ซ๐ข๐Ÿ๐ข๐œ๐š๐ญ๐ข๐จ๐งย ๐ฉ๐ซ๐จ๐œ๐ž๐ฌ๐ฌ๐ž๐ฌย 

After conducting a thorough investigation, we recognised that the recovery process wasn't working, Following conversations with the customerโ€™s previous supplier, we then contacted Microsoft's Compliance and Governance team in the States. This process was further complicated by time zone differences.




๐•๐ž๐ซ๐ข๐Ÿ๐ข๐œ๐š๐ญ๐ข๐จ๐งย ๐š๐ง๐ย ๐Ÿ๐ข๐ง๐š๐ฅ๐ฅ๐ฒย ๐š๐œ๐œ๐ž๐ฌ๐ฌย 

Then we passed several levels of security measures and verification controls to confirm our identity. Once verification was successful, we gained the necessary access, we reviewed the Microsoft 365 environment to bring it up to current standard and put security measures in place to avoid future administrative issues.

Commentaires


bottom of page