Security scans of the Skype for Business infrastructure from the perspective of an external and internal attacker. Design review of the concept and selective check of the configuration whether the concept was implemented as intended