How to Use the New Virtual Appointments in Microsoft Teams

Tanya Wetson-Catt • 19 May 2023

Scheduling appointments is a common activity. Salespeople often set up virtual appointments to answer questions about a product. Software companies allow people to schedule live demos. Telehealth therapists allow clients to book video sessions.


Those are just a few examples of some groups that are going to love a new Microsoft Teams feature. Virtual Appointments was recently added to the platform. It adds a new meeting style tailored for engagements with customers.


Have you’ve been using Teams and a different online appointment app? This new feature will streamline the experience.


What Is Virtual Appointments in Teams?


Virtual Appointments gives you an all-in-one meeting platform for customer engagements. You can schedule, manage and conduct B2C meetings in Microsoft Teams.


This new feature brings together the scheduling component with the video conference interface. Anyone with the link can join the virtual appointment. They do not need a Teams account.




The power of Microsoft’s scheduling app, Bookings, connects to Teams. This makes the Virtual Appointments function as seamless as possible.


Some of the features below will be available with any Microsoft 365 plan. Some are available with a premium plan.


Teams Virtual Appointments Features


Manage Scheduled Appointments


You can see your scheduled appointments in a single view. Manage cancellations and time changes easily.


Send Customized Confirmations & Reminders


You can send customers a customized message via SMS or email. This personalizes the experience for them. You can also use automation to give that personal touch without having to send each one manually. Automated appointment reminders are another time-saving function.


Customized Waiting Room


Add a personal touch to your virtual engagements. You can customize the Teams waiting room. You can use themes and logos to brand your business. You can also chat with attendees while in the lobby waiting room. This is helpful if your current appointment is running a little long. You can let them know you’ll be right with them.


Meeting Follow-ups


You can send meeting follow-ups after a virtual appointment. This helps you reduce the time it takes to send any promised follow-up information. You also keep all details in a single place. This makes your client communication trail easier to follow.

 

Organization & Department Analytics


How effective are your appointments? It’s hard to know if your demos are resulting in sales if you don’t have a good tracking system. It’s also important to have visibility into customer appointments across the organization.


You can do this with a premium analytics feature. It gives you helpful reporting. The reporting provides insights into B2C virtual appointments in all departments.


How to Use Virtual Appointments


To start using Virtual Appointments in Teams, admins must set up a few things. Note, they must be a Bookings admin to access these settings.


Create a Calendar


In the Virtual Appointments app choose to “Create a calendar.” You can find this option on the Home tab.


Larger organizations may wish to create different calendars for different departments.


Add Staff


Next, add staff members. You can add up to 100. You will also need to assign them a role. Once you’ve added your staff, you can view their availability in both Teams and Outlook.


What's another nice thing about using an integrated platform like M365? It's the cross-app compatibility. Your calendar syncs across apps.


Create Appointment Types


You’ll next set up your appointment types. You can choose from these two options:


·        Scheduled: You schedule the day/time. The system adds this information to the email confirmation. 

·        On-demand (Teams Premium): Customers can choose when to meet from your booking calendar.



Set Up SMS Notifications (If desired)


If you choose to use SMS notifications and have the right Teams plan, you can set this up next. This allows you to easily send appointment confirmations and reminders via text message.


Note: Attendees currently need a valid U.S., Canadian, or U.K. phone number to receive the SMS notifications.


Link Forms (If desired)


If you would like your attendees to fill out any forms, you can link them now. Virtual Appointments allows linking up to four cloud-based forms. These would be forms you have created in Microsoft Forms.


Publish Your Booking Page


If you want to give customers the ability to book on-demand appointments, take this next step. You will need to publish the booking page. You do this on the “Manage” tab of Virtual Appointments. Select “Booking page,” and turn on “Publish booking page.”


Get Help Using Your Microsoft 365 Tools More Effectively


Microsoft 365 is a platform with many possibilities. Often, companies aren’t using all the features they could. As a result, their team may be less effective. They could also be wasting money on apps they don’t need.



Are you interested in help supercharging your Microsoft 365 experience? Give us a call today to set up a meeting.

Let's Talk Tech

More from our blog

by Tanya Wetson-Catt 27 August 2025
Picture this: your business’s front door is locked tight, alarm systems are humming, and firewalls are up, but someone sneaks in through the back door, via a trusted vendor. Sound like a nightmare? It’s happening more often than you think. Cybercriminals aren’t always hacking directly into your systems anymore. Instead, they exploit the vulnerabilities in the software, services, and suppliers you rely on every day. For small businesses, this can feel like an impossible puzzle. How do you secure every link in a complex chain when resources are tight? That’s where reliable IT solutions come in. They help you gain visibility and control over your entire supply chain, providing the tools to spot risks early and keep your business safe without breaking the bank. A report shows that 2023 supply chain cyberattacks in the U.S. affected 2,769 entities, a 58% increase from the previous year and the highest number reported since 2017 . The good news is you don’t have to leave your business exposed. With the right mindset and practical steps, securing your supply chain can become manageable. This article walks you through easy-to-understand strategies that even the smallest business can implement to turn suppliers from a risk into a security asset. Why Your Supply Chain Might Be Your Weakest Link Here’s the harsh truth: many businesses put a lot of effort into protecting their internal networks but overlook the security risks lurking in their supply chain. Every vendor, software provider, or cloud service that has access to your data or systems is a potential entry point for attackers. And what’s scarier? Most businesses don’t even have a clear picture of who all their suppliers are or what risks they carry. A recent study showed that over 60% of organisations faced a breach through a third party, but only about a third trusted those vendors to tell them if something went wrong. That means many companies find out about breaches when it’s already too late, after the damage is done. Step 1: Get a Clear Picture: Map Your Vendors and Partners You might think you know your suppliers well, but chances are you’re missing a few. Start by creating a “living” inventory of every third party with access to your systems, whether it’s a cloud service, a software app, or a supplier that handles sensitive information. List everyone: Track every vendor who touches your data or systems. Go deeper: Look beyond your direct vendors to their suppliers, sometimes risks come from those hidden layers. Keep it current: Don’t treat this as a one-time job. Vendor relationships change, and so do their risks. Review your inventory regularly. Step 2: Know Your Risk: Profile Your Vendors Not all vendors carry the same weight in terms of risk. For example, a software provider with access to your customer data deserves more scrutiny than your office supplies vendor. To prioritise, classify vendors by: Access level: Who can reach your sensitive data or core infrastructure? Security history: Has this vendor been breached before? Past problems often predict future ones. Certifications: Look for security certifications like ISO 27001 or SOC 2, but remember, certification isn’t a guarantee, dig deeper if you can. Step 3: Don’t Set and Forget: Continuous Due Diligence Treating vendor security like a box to check once during onboarding is a recipe for disaster. Cyber threats are evolving, and a vendor who was safe last year might be compromised now. Here’s how to keep your guard up: Go beyond self-reports: Don’t rely only on questionnaires from vendors, they often hide problems. Request independent security audits or penetration testing results. Enforce security in contracts: Make sure contracts include clear security requirements, breach notification timelines, and consequences if those terms aren’t met. Monitor continuously: Use tools or services that alert you to any suspicious activity, leaked credentials, or new vulnerabilities in your vendor’s systems. Step 4: Hold Vendors Accountable Without Blind Trust Trusting vendors to keep your business safe without verification is a gamble no one should take. Yet, many businesses do just that. To prevent surprises: Make security mandatory: Require vendors to implement multi-factor authentication (MFA), data encryption, and timely breach notifications. Limit access: Vendors should only have access to the systems and data necessary for their job, not everything. Request proof: Ask for evidence of security compliance, such as audit reports, and don’t stop at certificates. Step 5: Embrace Zero-Trust Principles Zero-Trust means never assuming any user or device is safe, inside or outside your network. This is especially important for third parties. Key steps include: Strict authentication: Enforce MFA for any vendor access and block outdated login methods. Segment your network: Make sure vendor access is isolated, preventing them from moving freely across your entire system. Verify constantly: Recheck vendor credentials and permissions regularly to ensure nothing slips through the cracks. Businesses adopting Zero-Trust models have seen a huge drop in the impact of vendor-related breaches, often cutting damage in half. Step 6: Detect and Respond Quickly Even the best defences can’t guarantee no breach. Early detection and rapid response make all the difference. Practical actions include: Monitoring vendor software: Watch for suspicious code changes or unusual activity in updates and integrations. Sharing threat info: Collaborate with industry groups or security services to stay ahead of emerging risks. Testing your defences: Conduct simulated attacks to expose weak points before cybercriminals find them. Step 7: Consider Managed Security Services Keeping up with all of this can be overwhelming, especially for small businesses. That’s where managed IT and security services come in. They offer: 24/7 monitoring: Experts watch your entire supply chain non-stop. Proactive threat detection: Spotting risks before they escalate. Faster incident response: When something does happen, they act quickly to limit damage. Outsourcing these tasks helps your business stay secure without stretching your internal resources thin. Ignoring supply chain security can be costly. The average breach involving a third party now tops £4 million, not to mention the damage to reputation and customer trust. On the flip side, investing in proactive supply chain security is an investment in your company’s future resilience. It protects your data, your customers, and your bottom line. Taking Action Now: Your Supply Chain Security Checklist Map all vendors and their suppliers. Classify vendors by risk and access level. Require and verify vendor security certifications and audits. Make security mandatory in contracts with clear breach notification policies. Implement Zero-Trust access controls. Monitor vendor activity continuously. Consider managed security services for ongoing protection. Stay One Step Ahead Cyber attackers are not waiting for a perfect moment, they are scanning for vulnerabilities right now, especially those hidden in your vendor ecosystem. Small businesses that take a proactive, strategic approach to supply chain security will be the ones that avoid disaster. Your suppliers shouldn’t be the weakest link. By taking control and staying vigilant, you can turn your supply chain into a shield, not a doorway for attackers. The choice is yours: act today to protect your business or risk being the next headline.  Contact us to learn how our IT solutions can help safeguard your supply chain.
by Tanya Wetson-Catt 22 August 2025
Does it ever seem like your small business is overwhelmed with data? This is a very common phenomenon. The digital world has transformed how small businesses operate. We now have an overwhelming volume of information to manage employee records, contracts, logs, financial statements, not to mention customer emails and backups. A study by PR Newswire shows that 72% of business leaders say they've given up making decisions because the data was too overwhelming. If not managed properly, all this information can quickly become disorganised. Effective IT solutions help by putting the right data retention policy in place. A solid data retention policy helps your business stay organised, compliant, and save money. Here's what to keep, what to delete, and why it matters. What Is a Data Retention Policy and Why Should You Care? Think of a data retention policy as your company’s rulebook for handling information. This shows how long you hold on to data, and when is the right time to get rid of it. This is not just a cleaning process, but it is about knowing what needs to be kept and what needs to be deleted. Every business collects different types of data. Some of it is essential for operations or for legal reasons. Other pieces? Not so much. It may seem like a good idea to hold onto data, but this increases the cost of storage, clutters the systems, and even creates legal risks. Having a policy not only allows you to keep what's necessary but lets you do so responsibly. The Goals Behind Smart Data Retention A good policy balances data usefulness with data security. You want to keep the information that has value for your business, whether for analysis, audits, or customer service, but only for as long as it’s truly needed. Here are the main reasons small businesses implement data retention policies: Compliance with local and international laws. Improved security by eliminating outdated or unneeded data that could pose a risk. Efficiency in managing storage and IT infrastructure. Clarity in how and where data lives across the organisation. And let’s not forget the value of data archiving. Instead of storing everything in your active system, data can be tucked away safely in lower-cost, long-term storage. Benefits of a Thoughtful Data Retention Policy Here’s what a well-planned policy brings to your business: Lower storage costs: No more paying for space used by outdated files. Less clutter: Easier access to the data you do need. Regulatory protection: Stay on the right side of laws like GDPR, HIPAA, or SOX. Faster audits: Find essential data when regulators come knocking. Reduced legal risk: If it’s not there, it can’t be used against you in court. Better decision-making: Focus on current, relevant data, not outdated noise. Best Practices for Building Your Policy While no two businesses will have identical policies, there are some best practices that work across the board: 1. Understand the laws: Every industry and region has specific data requirements. Healthcare providers, for instance, must follow HIPAA and retain patient data for six years or more. Financial firms may need to retain records for at least seven years under SOX. 2. Define your business needs: Not all retention is about legal compliance. Maybe your sales team needs data for year-over-year comparisons, or HR wants access to employee evaluations from the past two years. Balance legal requirements with operational needs. 3. Sort data by type: Don’t apply a one-size-fits-all policy. Emails, customer records, payroll data, and marketing files all serve different purposes and have different retention lifespans. 4. Archive don’t hoard: Store long-term data separately from active data. Use archival systems to free up your primary IT infrastructure. 5. Plan for legal holds: If your business is ever involved in litigation, you’ll need a way to pause data deletion for any records that might be needed in court. 6. Write two versions: One detailed, legal version for compliance officers, and a simplified, plain-English version for employees and department heads. Creating the Policy Step-by-Step Ready to get started? Here’s how to go from idea to implementation: 1. Assemble a team: Bring together IT, legal, HR, and department heads. Everyone has unique needs and insights. 2. Identify compliance rules: Document all applicable regulations, from local laws to industry-specific guidelines. 3. Map your data: Know what types of data you have, where it lives, who owns it, and how it flows across systems. 4. Set retention timelines: Decide how long each data type stays in storage, gets archived, or is deleted. 5. Determine responsibilities: Assign team members to monitor, audit, and enforce the policy. 6. Automate where possible: Use software tools to handle archiving, deletion, and metadata tagging. 7. Review regularly: Schedule annual (or bi-annual) reviews to keep your policy aligned with new laws or business changes. 8. Educate your staff: Make sure employees know how the policy affects their work and how to handle data properly. A Closer Look at Compliance If your business operates in a regulated industry, or even just handles customer data, compliance is non-negotiable. Examples of data retention laws from around the world include: HIPAA: Healthcare providers must retain patient records for at least six years. SOX: Publicly traded companies must keep financial records for seven years. PCI DSS: Businesses that process credit card data must retain and securely dispose of sensitive information. GDPR: Any business dealing with EU citizens must clearly define what personal data is kept, why, and for how long. CCPA: California-based or U.S. companies serving California residents must provide transparency and opt-out rights for personal data. Ignoring these rules can lead to steep fines and reputational damage. A smart IT service provider can help navigate these regulations and keep you compliant. Clean Up Your Digital Closet Just like you wouldn’t keep every receipt, email, or post it note forever, your business shouldn’t hoard data without a good reason. A smart, well-organised data retention policy isn’t just an IT necessity, it’s a strategic move for protecting your business, lowering costs, and staying on the right side of the law. IT solutions aren’t just about fixing broken computers; they’re about helping you work smarter. And when it comes to data, a little organisation goes a long way. So don’t wait for your systems to slow down or a compliance audit to hit your inbox.  Contact us to start building your data retention policy today and take control of your business’s digital footprint.
by Tanya Wetson-Catt 18 August 2025
Let’s be honest, operating a small or medium-sized business requires wearing multiple hats. From chasing approvals to manually updating spreadsheets, it’s easy for your team to get stuck doing time-consuming tasks that drag down productivity. That’s where smart IT solutions come in, and one of the most effective tools available today is Microsoft Power Automate. In 2024, 85% of business leaders say AI-powered automation is key to driving productivity and efficiency across industries. Whether you're offering IT services or managing internal operations, Power Automate gives you the power to streamline the chaos. In this guide, we’ll break down exactly how it works, what it can do for you, and how to start automating your workflows without needing a degree in coding. What is Microsoft Power Automate? Power Automate is a tool offered by Microsoft for business automation purposes, designed to assist companies in developing workflows for routine tasks such as notifications, file copying, requesting approvals, and more. The best part? You don’t need to be a tech expert to use it. Power Automate uses a simple drag-and-drop interface that works across desktop, mobile, Microsoft Teams, and the browser. Why It’s a Game-Changer of SMBs For small and medium businesses, every bit of time saved matters. Power Automate allows you to build workflows (called "flows") that eliminate manual steps and speed things up, without hiring developers or buying extra tools. Think of it as your virtual assistant that never takes a coffee break. It even comes with hundreds of pre-built templates and connectors. Want to automatically save email attachments to OneDrive? Done. Need to get a Teams message when a file changes in SharePoint? Easy. Need a manager to approve a vacation request via email? Just pick a template and customise it. Real-World Use Cases That Make Life Easier Power Automate is not all about fancy features, it's about solving actual problems. Here are some everyday examples of what it can do: Customer onboarding: As a customer signs up, automatically send welcome emails, update task assignments for the relevant teams, and make updates to the CRM. Sales lead management: With a new entry, Power Automate can set up background follow-up emails, delegate the lead to an available sales executive, and note the prior activity all in one go. Expense reports: Set a workflow to pull receipts, summarise total expenses, and submit for approval instead of collecting receipts and filling out forms. New hire setup: Once an employee is added to your HR system, the tool can trigger a series of actions, creating accounts, sharing documents, and scheduling orientation meetings. Project management: Kick off a new project with automated task lists, team assignments, and progress tracking tools that keep everything on schedule. Key Features That Make It Work Here is a short overview of what Power Automate has to offer: Templates: For frequent activities such as transfer of files, email alerts, approvals, and reminders, there are prebuilt templates that can be used. Connectors: For popular applications such as SharePoint, Dropbox, Outlook, Google Drive, and even Twitter, there are more than 300 built-in connectors available. Triggers and actions: Each flow has a trigger that starts it. For example, receiving an email. After that, the flow executes actions, which can be any of the following: create a task, send a message, save a file. The actions can be adjusted to achieve your desired outcome. Cross-platform use: Available via Microsoft Teams, mobile, desktop, and browser, so you can manage your workflows anywhere. What About Security? Power Automate is built on Microsoft’s cloud infrastructure , meaning it benefits from robust security protocols, especially when integrated with Azure Active Directory. You can easily audit your flows, restrict access where needed, and protect sensitive data. It’s also a great option for IT teams dealing with older systems. Power Automate can connect to legacy software without forcing you to replace or overhaul existing tools. Robotic Process Automation (RPA) and Process Advisor If you're looking to really scale things up, Power Automate offers more advanced tools like Robotic Process Automation (RPA). This allows you to record your screen and mouse movements to create repeatable actions, great for tasks like pulling data from systems that don’t have APIs. There are two types of RPA flows: Attended RPA: Runs while you’re logged in, ideal for tasks that still need some human input. Unattended RPA: Runs in the background based on a trigger, with no user required. Then there's Process Advisor, a tool that helps you analyse how your team works. It can identify bottlenecks and highlight steps that slow things down, so you can automate smarter. Project Management: Five Ways Power Automate Helps If you’re in charge of projects, you know how much time goes into communication, documentation, and keeping everything on track. Here’s how Power Automate can give you back some of that time: Automated Approvals Set up automated flows for document approvals, project requests, or budget reviews, no more chasing down signatures. Centralised Document Management Store project documents in one place, track changes, and ensure everyone’s always working off the latest version. Real-Time Reporting Connect Power BI to Power Automate to create live dashboards and reports that reflect real-time progress on tasks and budgets. Team Communication via Teams Set up instant notifications in Microsoft Teams when key updates happen, like task completions or deadline changes, so nothing falls through the cracks. Smarter Task Organisation Use automation templates to schedule meetings, send reminders, and assign priorities, helping your team focus on what really matters. Streamline Your Work in Minutes Getting started with Power Automate is easier than you think. Log into Microsoft 365, open Power Automate, pick a template or build your own, customise, and save. It runs in the background automatically.  Power Automate helps small businesses ditch the busywork, boost productivity, and grow smarter. Ready to streamline your workflows? Contact us today to get started.