Consider the following scenario:
- You sign in to Microsoft Lync 2013 on a computer in a network environment.
- The environment is deployed with the remote access service or with the IT tools that temporarily blocks network traffic for device validation.
- The computer disconnects and then reconnects to the network.