End Of Availability For Microsoft Classic Teams Client


Most users have already started to embrace the new Microsoft Teams client, but for those users that have yet to make the switch for various reasons should be aware that Microsoft intend on ending support for the classic Teams client, starting 1st July 2024. They then intend on ending its availability on 1st July 2025.

For those users who have already made the switch by simply clicking on the ‘Yes, go to new Teams’ button (as shown below), but have experienced issues with this new version of Teams, then we highly recommend that you conduct an uninstall of the classic version. Then download and install the new Microsoft Teams client from Microsoft O365 (you will need admin privileges to do this). We have found that switching to the new Microsoft Teams client this way, resolves various common reported issues.

Click below for more information on end of availability for Microsoft classic Teams client and guidance on deploying this:


How CQi Automates CAD Deployments and Reduces Risk

05 September 2025

In modern Architecture, engineering, construction and design environments, the pressure is on IT teams to deliver fast, consistent, and secure software setups. Whether you're supporting ten users or ten thousand, manual installation methods simply can’t keep up with the demands of large-scale CAD environments. That’s where CQi (Configuration Intelligence)steps in. At Symetri, we developed CQi to help organisations automate CAD deployment, reduce risk, and maintain standardisation—all without increasing the burden on IT departments. In this blog, we’ll explore how CQi works and why it’s becoming a go-to solution for smarter CAD management.

Security Gaps You Didn't Know You Had

26 August 2025

As cybersecurity threats continue to evolve, some of the biggest risks to your organisation might not be obvious. In this month’s IT Bulletin, we shine a light on three critical security concerns that are often underestimated or overlooked entirely. These issues can silently compromise systems, leak data, or be exploited without detection.