Index

A

A (Host) records, Using DNS to Publish Office Communications Server
A records, Understanding Subject Alternate Name
Access control entry (ACE), Performing the Prep Forest Step
Access control lists (ACLs), SERVICE, Understanding Enhanced Presence, Managing Access Rights
Access Edge Proxy, Examining the Basic Remote Access Scenario in Detail
Access Edge Server, Overview of Office Communications Server 2007
certificates of, Configuring the Common Name or Subject Name
Director servers and, Director Role
DNS discovery of, Single Edge Server
federation and, Understanding the Open Authenticated Conference, Understanding Direct Federation, Understanding Direct Federation
for mobile remote access, Remote Access Scenarios
in direct federation, Understanding Direct Federation, Understanding Direct Federation
in Voice over IP (VoIP), Examining the Technical Details Behind VoIP Scenarios, Configuring the Mediation Server
role of, Access Edge Server, Access Edge Server
Access Proxy, Understanding Direct Federation
Access.
federated partner, Configuring an Edge Server for Federation, Administering Federated Partner Access, Administering Federated Partner Access
levels of, Examining What Happens During Login Processing (Step 3), Step 5: Controlling the Access Level of a Contact, Examining What Happens When Controlling the Access Level of a Contact (Step 5)
rights management for, Managing Access Rights
to conferences, Understanding Conference Security and Access Types, Understanding the Anonymous Allowed Conference, Understanding Meeting Policy and Policy Enforcement
Accounting, Understanding Federation with Public IM Providers
ACK message, Examining What Happens During Session Establishment and Sending a Message (Post Step 2), Examining What Happens When Sharing Video (Step 6), ACK
Activation, Understanding Conference Activation
Active Directory, Understanding How Office Communications Server Leverages Active Directory, Performing the Prep Forest Step, Performing the Prep Forest Step
activation of, Understanding How Office Communications Server Leverages Active Directory, Understanding How Office Communications Server Leverages Active Directory
benefits of, Understanding How Office Communications Server Leverages Active Directory
deployment and, Step 3: Plan Your Deployment Path
forest configuration for, Understanding How Office Communications Server Leverages Active Directory
global settings and, Understanding How Office Communications Server Leverages Active Directory, Understanding How Office Communications Server Leverages Active Directory
media types in, Understanding How Office Communications Server Leverages Active Directory, Understanding How Office Communications Server Leverages Active Directory
prep domain step and, Performing the Prep Domain Step, Using DNS to Publish Office Communications Server, Using DNS to Publish Office Communications Server
prep forest step and, Performing the Prep Forest Step, Performing the Prep Forest Step
prep schema step and, Performing the Prep Forest Step
trusted server list in, Understanding How Office Communications Server Leverages Active Directory, Understanding How Office Communications Server Leverages Active Directory
user settings stored in, Standard Edition Server, Standard Edition Server
Active Directory Configuration Partition, Configuring Global Settings
Active Directory Distribution Group, Understanding Conferencing Clients
Active Directory Domains, Monitoring Overall Status by Using the Status Pane
Active Directory System Container, Configuring Global Settings
Active Directory Users and Computers (ADUC), Examining What Happens After Sign-In Starts (Post Step 1), Enabling Users for Public IM Connectivity, Configuring Per-User and Global Settings, Configuring a User for RCC, Reassigning Users
Active-passive SQL clustering, Enterprise Edition Pool, Scaling with SQL Server
Activity, Examining What Happens During Login Processing (Step 3), Examining What Happens During Looking Up a Contact (Step 1), Examining What Happens When Subscribing for Presence and Receiving an Offline Notification (Step 3)
Ad hoc conferences, Understanding Conference Creation, Understanding Conference Expiration, Using Ad Hoc Conference Calling, Examining the Technical Details Behind VoIP Scenarios
addConference command, Understanding Conference Deactivation
Address Book Services (ABS), Examining What Happens During Login Processing (Step 3), Examining What Happens During Looking Up a Contact (Step 1), Understanding Web Components, Overview of Remote Call Control Scenario, Starting Communicator 2007, Step 9: Plan for Address Book Server
addUser C3P command, Understanding the Client Join Sequence to the Web Conferencing Server
Admin Tools Microsoft Management Console (MMC)
for monitoring, Monitoring, Monitoring Office Communications Server 2007 by Using Microsoft Operations Manager 2005, Monitoring Overall Status by Using the Status Pane, Using Event Log Filters, Understanding Event Types, Monitoring Performance by Using the Performance Tab, Using the Performance Monitor, Monitoring Office Communications Server 2007 by Using Microsoft Operations Manager 2005
event log tab of, Monitoring Events by Using the Event Log Tab, Using Event Log Filters, Understanding Event Types
performance tab of, Monitoring Performance by Using the Performance Tab, Using the Performance Monitor
status pane of, Monitoring Office Communications Server by Using the Admins Tools, Monitoring Overall Status by Using the Status Pane
in administration model, Administration, Configuring Global Settings, Configuring Global Settings
in Voice over IP (VoIP), Configuring Global Enterprise Voice Settings, Configuring Voice Policies, Configuring Users for Unified Communications, Configuring the Mediation Server
Administration, Administration, On the Companion CD, On the Companion CD
global settings configuration in, Administration, Configuring User-Specific Settings, Configuring Global Settings, Configuring UC-specific Settings, Configuring Policy-Specific Settings, Configuring Trusted Server Settings, Configuring User-Specific Settings
for service connection point, Configuring Policy-Specific Settings, Configuring Service Connection Point Settings
trusted server, Configuring Trusted Server Settings
UC-specific, Configuring UC-specific Settings
user-specific, Configuring User-Specific Settings
in migrating from Live Communications Server 2005 SP1, Migrating Users from Live Communications Server 2005 SP1 to Office Communications Server 2007, Migrating Users from Live Communications Server 2005 SP1 to Office Communications Server 2007
pool settings configuration in, Configuring Pool Settings
server settings configuration in, Configuring Server Settings, Migrating Users from Live Communications Server 2005 SP1 to Office Communications Server 2007, Configuring Application Server Settings, Configuring Filter Settings, Configuring Conferencing Server Settings, Configuring Communicator Web Access Server Settings, Migrating Users from Live Communications Server 2005 SP1 to Office Communications Server 2007
Administrative Console, Configuring the Deployment Validation Tool Server, Configuring the DVT Organizer, Managing DVT by Using the Administrative Console
Adobe PDF format, Understanding Data Collaboration
Adsiedit.msc, Understanding How Office Communications Server Leverages Active Directory
Advanced Encryption Standard (AES), Understanding Web Conferencing Server Content Management
Advanced media gateways, Bridging VoIP to the PSTN Network by Using a Media Gateway, Configuring the Mediation Server
Agents (clients)
archiving and CDR, Prerequisites for Deploying the Archiving and CDR Service
in Deployment Validation Tools Server, Configuring the QoE Monitoring Server, Configuring the DVT Agent, Configuring the Deployment Validation Tool Server, Configuring the DVT Organizer, Configuring the DVT Agent
AJAX client, Overview of Office Communications Server Clients
Alerts, Using Alerts, Using Alerts
Alternate call, Overview of Remote Call Control Scenario
America Online (AOL), Provisioning Federation with a Public IM Service Provider
Annotations, Understanding Data Collaboration
Anonymous allowed conference, Understanding the Anonymous Allowed Conference
Anonymous users
federation and, Managing Multiple User Accounts, Managing Multiple User Accounts
in conferences, Understanding Federated Users, Understanding Conferencing User Roles, Understanding Meeting Policy and Policy Enforcement
in public IM connectivity, Configuring Per-User and Global Settings
Answering Agents, Configuring the Deployment Validation Tool Server, Configuring the DVT Agent
API module, Examining the RTCsrv.exe Process, Examining the RTCsrv.exe Process
Apple Safari browser, Enabling Office Communicator Web Access 2007
Application event logs, Examining What Happens During the Initial Launch of Communicator 2007 (Pre-Step 1), Examining What Happens After Sign-In Starts (Post Step 1), Examining What Happens After Sign-In Starts (Post Step 1)
Application servers, Configuring Application Server Settings, Configuring Filter Settings
Application sharing, Overview of Web Conferencing Capabilities, Understanding Data Collaboration, Examining the Web Conferencing Remote Access Scenario in Detail
Architecture, Examining the Technical Details Behind Conferencing Scenarios, Understanding Conferencing Clients, Understanding the Conferencing Database, Understanding Conferencing Servers and the Conferencing Server Factory, Understanding Edge Servers, Microsoft Office Communications Server 2007 Internals, Understanding the Office Communications Server 2007 Architecture, Understanding Office Communications Server 2007 Internal Components
clients in, Understanding Conferencing Clients, Understanding Conferencing Clients
core, Step 2: Select Your Topology
database in, Understanding the Conferencing Database
Edge Servers in, Understanding Edge Servers
Enterprise pool of, Understanding Enterprise Pools, Understanding Office Communications Server 2007 Internal Components, Understanding Office Communications Server 2007 Internal Components
example of, Step 12: Plan for Compliance and Usage Analysis
Focus in, Understanding Focus, Understanding Conferencing Servers and the Conferencing Server Factory, Understanding the Focus Factory, Understanding Conferencing Servers and the Conferencing Server Factory
large meetings and, Understanding Conferencing Servers and the Conferencing Server Factory, Understanding Web Components, Understanding Web Components
overview of, Microsoft Office Communications Server 2007 Internals, Understanding Pool Configurations, Understanding the Office Communications Server 2007 Architecture, Understanding Pool Configurations
performance testing of, Understanding Conferencing Servers and the Conferencing Server Factory, Understanding Conferencing Servers and the Conferencing Server Factory
pool configurations in, Understanding Pool Configurations, Understanding Enterprise Pools, Examining the Enterprise Edition: Consolidated Configuration, Understanding Enterprise Pools
process and machine boundaries for, Understanding Conferencing Servers and the Conferencing Server Factory, Understanding Process and Machine Boundaries for Conferencing Components, Understanding Process and Machine Boundaries for Conferencing Components
protocols in, Understanding the Conferencing Protocols, Understanding the Conferencing Protocols, Understanding the Conference Life Cycle
servers and server factory in, Understanding Conferencing Servers and the Conferencing Server Factory, Understanding Conferencing Servers and the Conferencing Server Factory
target, Contoso's Deployment Path
tested capacity numbers in, Understanding Conferencing Servers and the Conferencing Server Factory, Understanding Conferencing Servers and the Conferencing Server Factory
Web components in, Understanding Web Components
with Enterprise Voice, Step 8: Plan for VoIP
Archiving
deploying, Prerequisites for Deploying the Archiving and CDR Service, Monitoring Usage, Deploying the Archiving and CDR Service, Monitoring Usage
in public IM connectivity, Configuring Per-User and Global Settings
module for, Examining the RTCsrv.exe Process, Examining the RTCsrv.exe Process
server for, Microsoft Office Communications Server 2007 SDK, Telephony Conferencing Server, Edge Servers, Archiving and CDR Server, Edge Servers, Step 1: Determining Key Planning Decisions
Archiving CDR Reporter, Contoso's Deployment Path for Madrid, Reporting Usage Data, Overview of Diagnostic Tools
ASP.NET Web service, Web Components Server
Asymmetric key cryptography, Understanding TLS Certificates
Attendee role, Understanding Conferencing User Roles, Examples of Resolving Common Conferencing Problems
Audio Conferencing Provider (ACP), Understanding Audio Conferencing Provider Support, Understanding Conferencing Clients, Understanding Conferencing Servers and the Conferencing Server Factory
Audio-Video conferencing, Understanding Data Collaboration, Examining the Technical Details Behind Conferencing Scenarios, Understanding Audio Conferencing Provider Support, Examining the Technical Details Behind Conferencing Scenarios
access types for, Understanding Meeting Policy and Policy Enforcement, Understanding Meeting Policy and Policy Enforcement
Edge Server for, Overview of Office Communications Server 2007, A/V Edge Server, Remote Access Scenarios, Single Edge Server, Single-Site Edge Topology
overview of, Overview of Audio/Video Conferencing Capabilities
remote access for, Remote Access Scenarios, Understanding Audio and Video Conferencing Remote Access
server deployment example for, Preparing DNS, Firewall Ports, and Certificates for Chicago Deployment, Preparing DNS, Firewall Ports, and Certificates for Chicago Deployment
server for, Overview of Office Communications Server 2007, Conferencing Servers, Web Conferencing Server, Understanding Conferencing Servers and the Conferencing Server Factory
support for, The Evolution of Office Communications Server 2007
troubleshooting
common problems in, Examples of Resolving Common Conferencing Problems, Resolving Management and Configuration Problems
content download problems in, Examples of Resolving Common Conferencing Problems
management and configuration problems in, Examples of Resolving Common Management and Configuration Problems
Validation Wizard for, Resolving Management and Configuration Problems
Audio-Video Edge Server.
firewall configurations with, Understanding Edge Servers, Step 6: Plan for External User Access
in Voice over IP (VoIP), Configuring the Mediation Server
Audio-Video Tuning Wizard, Step 8: Plan for VoIP
AudioCodes media gateway, Bridging VoIP to the PSTN Network by Using a Media Gateway
Auditing, Understanding Federation with Public IM Providers, Provisioning Federation with a Public IM Service Provider
AuthCookie, Examining What Happens When Sending a File (Step 5)
Authentication.
by Office Communicator Web Access (CWA) 2007, Enabling Office Communicator Web Access 2007
certificates for, Using TLS and Certificates
clock accuracy for, Examples of Problem Events and Troubleshooting Steps
closed authenticated conference and, Understanding the Closed Authenticated Conference, Understanding the Anonymous Allowed Conference, Understanding the Anonymous Allowed Conference
in Communicator Web Access, Communicator Web Access
in conferencing, Understanding Conferencing User Types, Understanding Federated Users, Understanding Conference Security and Access Types
in initial registration, Examining What Happens After Sign-In Starts (Post Step 1), Examining What Happens After Sign-In Starts (Post Step 1)
in login sign-in process, Examining What Happens After Sign-In Starts (Post Step 1)
in remote access, Director Role, Understanding Basic Remote Access Topologies, Examining the Web Conferencing Remote Access Scenario in Detail, Understanding Audio and Video Conferencing Remote Access
of clients, Client Authentication
of federated users, Understanding Federation
of registration, Examining What Happens After Sign-In Starts (Post Step 1), Examining What Happens After Sign-In Starts (Post Step 1)
of servers, Client Authentication
open authenticated conference and, Understanding the Open Authenticated Conference
security from, Understanding Federation with Public IM Providers
Transport Layer Security (TLS) for, Understanding Authentication in Office Communications Server 2007, Overview of NTLM and Kerberos, Example of a TLS Handshake over the Network, Overview of NTLM and Kerberos
Authorization, Understanding Conference Security and Access Types, Understanding Federation with Public IM Providers
Auto Attendant, Step 8: Plan for VoIP
Automatic configuration, Examining What Happens After Sign-In Starts (Post Step 1)
Automatic discovery, Understanding Federated Partner Discovery, Configuring an Edge Server for Federation, Step 4: Prepare Your Infrastructure, Step 12: Plan for Compliance and Usage Analysis
Availability, Examining What Happens During Login Processing (Step 3), Examining What Happens During Looking Up a Contact (Step 1), Examining What Happens When Subscribing for Presence and Receiving an Offline Notification (Step 3)

B

Backup and restore, Backup and Restore, On the Companion CD, Backup and Restore Requirements, Backing Up Settings, Backing Up Pool and Global Settings, Backing Up Data, Backing Up Databases, Backing Up File Shares, Restoring Service, Deciding How to Restore Service, Verifying Restoration Prerequisites, Preparing to Use the Hardware and Software of an Existing Server for Database Recovery, Recovering an Existing Server, Reinstalling an Existing Server, Rebuilding a Server on New Hardware, Building Standby Servers, Restoring Databases, Restoring File Shares, Step 1: Prepare for Restoration of Settings, Step 2: Restore Settings, Step 4: Validate Services, Step 1: Prepare for Restoration of Settings, Step 2: Restore Settings, Step 5: Validate Server and Pool Functionality, Re-creating Enterprise Pools, Restoring Domain Information, Step 1: Determine the Recovery Support to Be Provided by the Secondary Site, Step 3: Set Up the Secondary Site, Step 6: Validate Site Recovery Capabilities by Simulating an Outage, Step 7: Bring the Secondary Site Online, Step 8: Restore the Primary Site and Bring It Back Online, Summary, On the Companion CD
best practices for, Step 8: Restore the Primary Site and Bring It Back Online, Step 8: Restore the Primary Site and Bring It Back Online
of data, Building Standby Servers, Restoring Settings in Standard Edition Server Environments, Restoring Databases, Restoring Settings in Standard Edition Server Environments
of domain information, Restoring Domain Information
of Enterprise Pool configuration settings, Step 4: Validate Services, Re-creating Enterprise Pools, Step 1: Prepare for Restoration of Settings, Step 2: Restore Settings, Step 3: Activate Servers (Only with a Re-created Enterprise Pool), Step 4: Start Services, Re-creating Enterprise Pools
of sites, Restoring Domain Information, Step 8: Restore the Primary Site and Bring It Back Online, Restoring Sites, Step 1: Determine the Recovery Support to Be Provided by the Secondary Site, Step 3: Set Up the Secondary Site, Step 5: Maintain the Secondary Site, Step 7: Bring the Secondary Site Online, Step 8: Restore the Primary Site and Bring It Back Online
primary, Step 8: Restore the Primary Site and Bring It Back Online
of Standard Edition settings, Restoring Databases, Step 1: Prepare for Restoration of Settings, Restoring Settings in Standard Edition Server Environments, Step 2: Restore Settings, Step 4: Validate Services, Step 1: Prepare for Restoration of Settings
planning, Backup and Restore, Restoring Service, Restoring Service
data in, Backing Up Data, Backing Up Databases, Backing Up File Shares
requirements in, Backup and Restore Requirements
settings in, Determining What Needs to Be Backed Up, Backing Up Settings, Backing Up Pool and Global Settings
potential scenarios for, Restoring Service, Deciding How to Restore Service, Deciding How to Restore Service
prerequisites for, Verifying Restoration Prerequisites
process for, Restoring Service, Deciding How to Restore Service, Deciding How to Restore Service
re-creating Enterprise Pools in, Re-creating Enterprise Pools, Reassigning Users, Reassigning Users
reassigning users in, Re-creating Enterprise Pools
server platforms for, Setting Up Server Platforms, Restoring Data, Preparing to Use the Hardware and Software of an Existing Server for Database Recovery, Recovering an Existing Server, Reinstalling an Existing Server, Rebuilding a Server on New Hardware, Installing Restoration Tools, Restoring Data
for database recovery, Setting Up Server Platforms, Preparing to Use the Hardware and Software of an Existing Server for Database Recovery
for existing server recovery, Preparing to Use the Hardware and Software of an Existing Server for Database Recovery, Recovering an Existing Server
for rebuilding server on new hardware, Rebuilding a Server on New Hardware
for reinstalling existing server, Recovering an Existing Server, Reinstalling an Existing Server, Rebuilding a Server on New Hardware
for standby servers, Rebuilding a Server on New Hardware, Building Standby Servers
tools for, Building Standby Servers
Bandwidth requirements, Step 5: Review System and Network Requirements, Step 6: Plan for External User Access, Step 6: Plan for External User Access
Basic hybrid media gateways, Understanding How Inbound Calls Are Routed
Basic media gateways, Bridging VoIP to the PSTN Network by Using a Media Gateway, Understanding How Inbound Calls Are Routed, Configuring the Media Gateway, Step 8: Plan for VoIP
BENOTIFY (best-effort notification), Examining What Happens During Login Processing (Step 3), Understanding the Conferencing Protocols, Step 2—BENOTIFY and OK/200
Best practices, Step 8: Restore the Primary Site and Bring It Back Online
Block list, Overview of the Public IM Connectivity Scenario
Blocked access, Understanding the Enhanced Presence Model
Browsers, Overview of Office Communications Server Clients, Enabling Office Communicator Web Access 2007
Buddy Lists, Step 6: Recipient Adds a User to Buddy List, Step 1: User Selects a Recipient from the Buddy List in Office Communicator
Business continuity requirements, Planning for Backup and Restore, Step 1: Determine the Recovery Support to Be Provided by the Secondary Site
BYE message, Examining What Happens When Ending the Conversation (Step 7), BYE

C

Caching Array of Redundant Proxy (CARP), Step 6: Plan for External User Access
CAI Networks WebMux, Building Redundancy with Hardware Load Balancing
Call deflection, Configuring Call Deflection, Configuring Call Forwarding, Configuring Call Forwarding
Call Detail Records (CDRs), Monitoring, Monitoring Office Communications Server Usage by Using Call Detail Records, Deploying the Archiving and CDR Service, Monitoring Usage, Database Schema for the Archiving and CDR Database
Archiving CDR Reporter for, Contoso's Deployment Path for Madrid, Contoso's Deployment Path for Madrid
conference information in, Overview of Conferencing Scenarios
database schema for, Database Schema for the Archiving and CDR Database, Database Schema for the Archiving and CDR Database
deploying archiving service in, Deploying the Archiving and CDR Service
in meeting compliance, Understanding Web Conferencing Server Content Upload and Download
in Voice over IP (VoIP), Configuring Location Profiles, Configuring the Mediation Server
usage monitoring by, Deploying the Archiving and CDR Service, Reporting Usage Data, Reporting Usage Data
usage reporting by, Reporting Usage Data, Database Schema for the Archiving and CDR Database, Database Schema for the Archiving and CDR Database
Call forwarding, Configuring Call Forwarding, Configuring Call Forwarding
Call hold and retrieve, Overview of Remote Call Control Scenario
Call logs, Examples of Resolving Common Telephony Problems
Call transfer, Overview of Remote Call Control Scenario, Overview of Remote Call Control Scenario
Call waiting, Overview of Remote Call Control Scenario
Caller ID, Overview of Remote Call Control Scenario
Calling Party Number Identification, Configuring a User for RCC
CANCEL message, Examining What Happens When Ending the Conversation (Step 7), CANCEL
Capacity
for meetings, Understanding Conferencing Servers and the Conferencing Server Factory, Understanding Conferencing Servers and the Conferencing Server Factory
of public IM connectivity (PIC), Capacity Planning Considerations
Centralized Conference Control Protocol (C3P), Conferencing Servers, IM Conferencing Server, Understanding the Conferencing Protocols, Understanding Conference Control
Certificate distribution point (CDP) field, Configuring the CRL Distribution Points, Configuring for Enhanced Key Usage, Configuring for Enhanced Key Usage
Certificate revocation lists (CRL), Configuring the CRL Distribution Points, Understanding Subject Alternate Name
Certificate Wizard, Step 3: Plan Your Deployment Path
Certificates.
for authentication, Understanding Authentication in Office Communications Server 2007, Overview of NTLM and Kerberos, Overview of NTLM and Kerberos
for Exchange 2007 Unified Messaging, Step 8: Plan for VoIP
for Office Communicator Mobile Access 2007, Examining a COMO Topology, On the Companion CD, Deploying Certificates for COMO, On the Companion CD
for public IM connectivity, Overview of the Public IM Connectivity Scenario, Enabling Federation with Public IM Service Providers
FQDNs and, Understanding How Office Communications Server Leverages Active Directory
in deployment, Step 4: Prepare Your Infrastructure, Contoso's Deployment Path, Overview of Preparing Firewall Ports, Certificates, NICs, and DNS
in federation, Understanding the Requirements for and Use of Certificates in Federation
in Voice over IP (VoIP), Step 8: Plan for VoIP
of Transport Layer Security (TLS), Understanding Subject Alternate Name, Comparing Consolidated Topology to Expanded Topology, Understanding TLS Certificates, Comparing Consolidated Topology to Expanded Topology
Private Key Infrastructure (PKI) and, Securing Office Communications Server with PKI, Scaling with SQL Server, Configuring for Enhanced Key Usage, Scaling with SQL Server
problem events with, Examples of Problem Events and Troubleshooting Steps
Public Certificate Authority for, Using DNS to Publish Office Communications Server
public-private key pairs for, Understanding TLS Certificates
testing, Examining What Happens After Sign-In Starts (Post Step 1)
Certification path, Configuring the Certification Path, Scaling with SQL Server
Challenge authentication, Step 6: Plan for External User Access
Chat, Overview of Web Conferencing Capabilities, Understanding Data Collaboration, Understanding Conferencing Clients
CheckSPN tool, Overview of Diagnostic Tools
Cipher Spec, Example of a TLS Handshake over the Network
Client Access License, Provisioning Federation with a Public IM Service Provider
Client Access Server (CAS), Step 8: Plan for VoIP
ClientLogReader, Overview of Diagnostic Tools, Looking at Trace Files, Examples of Resolving Common Office Communicator Problems, Examples of Resolving Common Office Communicator Problems
Clients
authentication of, Server Authentication
automatic configuration of, Examining What Happens After Sign-In Starts (Post Step 1), Examining What Happens After Sign-In Starts (Post Step 1)
federated, Examining How Clients from Two Federated Domains Get Online and Register Presence, Step 3—SUBSCRIBE sip:[email protected] SIP/2.0, Step 3—SUBSCRIBE sip:[email protected] SIP/2.0
Focus dialog with, Understanding Conference Creation, Understanding the Client Conference Joining Sequence
in conferencing architecture, Understanding Conferencing Clients, Understanding Conferencing Clients
in Web conferencing, Understanding Conference Expiration, Understanding Conference Control, Understanding the Client Conference Joining Sequence, Understanding the Client Join Sequence to the Web Conferencing Server, Understanding Conference Control
of Office Communications Server 2007, Overview of Office Communications Server Clients, Overview of Office Communications Server Clients
scheduling, Understanding Conferencing Clients, Understanding Conference Creation
troubleshooting, Resolving Common Problem Scenarios, Resolving Common Problem Scenarios
troubleshooting connections of, Examining What Happens After Sign-In Starts (Post Step 1), Examining What Happens After Sign-In Starts (Post Step 1)
version application for, Examining the RTChost.exe Process
Closed authenticated conference, Understanding the Closed Authenticated Conference, Understanding the Anonymous Allowed Conference, Understanding the Anonymous Allowed Conference
Clustering service, Enterprise Edition Pool, Scaling with SQL Server, Preparing DNS, Firewall Ports, and Certificates for Chicago Deployment
cnum parameter, Overview of NTLM and Kerberos
Collaboration, Understanding Data Collaboration, Understanding Conferencing Clients, Understanding Web Components
Collocation server roles, Conferencing Servers, Supported Collocation Server Roles, Summary
Common Information Model (CIM) tool, Configuring Pool Settings
Common name, Configuring the Common Name or Subject Name, Configuring the Subject Alternative Name
Communicator Web Access (CWA)
authentication in, Communicator Web Access
deployment of, Communicator Web Access
Microsoft Management Console of, Communicator Web Access
overview of, Overview of Office Communications Server Clients, Overview of Office Communications Server Clients
permission levels in, Standard Edition Server
server settings for, Configuring Mediation Server Settings
Company access, Understanding the Enhanced Presence Model
Compliance
data related to, Backup and Restore, Backup and Restore Requirements, Planning for Backup and Restore, Backup and Restore Requirements
for meetings, Understanding Web Conferencing Server Content Upload and Download, Understanding Meeting Compliance, Understanding Meeting Compliance
requirements for, Defining the Reliability Requirements
usage analysis and, Step 12: Plan for Compliance and Usage Analysis
Compression, Examining What Happens After Sign-In Starts (Post Step 1), Security Considerations
Computer groups, Monitoring Office Communications Server 2007 by Using Microsoft Operations Manager 2005, Using Alerts, Using Computer Groups, Using Alerts
Computer Telephony Integration (CTI), Examining What Happens During Login Processing (Step 3)
Conference calls, Understanding Conferencing Clients, Examples of Resolving Common Telephony Problems
Conferencing, Conferencing Scenarios, On the Companion CD, Understanding Conferencing User Types, Understanding Conferencing User Roles, Understanding Conference Security and Access Types, Understanding Conferencing Media Types, Understanding Audio and Video Conferencing, Examining the Technical Details Behind Conferencing Scenarios, Understanding the Conferencing Architecture, Understanding Conferencing Clients, Understanding the Conferencing Database, Understanding Focus, Understanding Conferencing Servers and the Conferencing Server Factory, Understanding Web Components, Understanding Process and Machine Boundaries for Conferencing Components, Understanding Edge Servers, Understanding the Conferencing Protocols, Understanding the Conference Life Cycle, Understanding Conference Creation, Understanding Conference Activation, Understanding Conference Deactivation, Understanding Conference Expiration, Understanding the Client Conference Joining Sequence, Understanding the Client Join Sequence to the Web Conferencing Server, Understanding Conference Control, Understanding Web Conferencing Server Content Management, Understanding Web Conferencing Server Content Upload and Download, Understanding Meeting Compliance, Understanding Web Conferencing Content Tools, Understanding Meeting Policy and Policy Enforcement, Summary, On the Companion CD
architecture of, Understanding the Conferencing Architecture, Understanding Conferencing Clients, Understanding Conferencing Servers and the Conferencing Server Factory, Understanding the Conferencing Protocols
clients in, Understanding Conferencing Clients
Focus in, Understanding the Focus Factory
large meetings and, Understanding Conferencing Servers and the Conferencing Server Factory
components for, Examining Presence Components, Examining VoIP Components, Examining Conferencing Components, Understanding the Focus, Examining VoIP Components, Examining VoIP Components
database for, Understanding the Conferencing Database
life cycle of, Understanding the Conference Life Cycle, Understanding Conference Creation
creation in, Understanding Conference Creation
deactivation in, Understanding Conference Deactivation
on-premises rules of, Understanding On-Premises Conferencing Rules for Federated and Nonfederated Users, Configuring an Edge Server for Federation, Configuring an Edge Server for Federation
security and access types in, Understanding Conference Security and Access Types, Understanding the Anonymous Allowed Conference, Understanding the Anonymous Allowed Conference
server factory for, Examining the RTChost.exe Process, Understanding the Conferencing Server Factory
trusted servers for, Understanding How Office Communications Server Leverages Active Directory
user roles in, Understanding Conferencing User Roles
user types in, Understanding Conferencing User Types, Understanding Anonymous Users, Understanding Federated Users, Understanding Anonymous Users
Conferencing and Presence Reports, Using Snooper
Conferencing client, Understanding Conferencing Clients
Conferencing Server, Conferencing Servers, Archiving and CDR Server, IM Conferencing Server, Telephony Conferencing Server, Archiving and CDR Server
Configuration container, Understanding How Office Communications Server Leverages Active Directory
Configuration Naming Context, Step 3: Plan Your Deployment Path
Configure Communications Server Users Wizard, Configuring Per-User and Global Settings, Configuring Users for Unified Communications, Migrating Users from Live Communications Server 2005 SP1 to Office Communications Server 2007
Connectivity.
establishment of, Examining What Happens After Sign-In Starts (Post Step 1), Examining What Happens After Sign-In Starts (Post Step 1)
Consolidated configuration, Overview of Office Communications Server 2007, Enterprise Edition Pool, Examining the Enterprise Edition: Consolidated Configuration
Consolidated topology in federation, Comparing Consolidated Topology to Expanded Topology, Understanding On-Premises Conferencing Rules for Federated and Nonfederated Users, Understanding On-Premises Conferencing Rules for Federated and Nonfederated Users
Consultative call transfer, Overview of Remote Call Control Scenario
Contacts
access level of, Step 5: Controlling the Access Level of a Contact
adding, Step 2: Adding a Contact, Step 3: Receiving an Offline Indication, Examining What Happens When Adding a Contact (Step 2)
looking up, Step 1: Looking Up a Contact, Step 2: Adding a Contact, Step 5: Controlling the Access Level of a Contact, Examining What Happens During Looking Up a Contact (Step 1), Examining What Happens When Adding a Contact (Step 2)
on home server, Standard Edition Server
public IM connectivity and, Examining the Technical Details Behind the Public IM Connectivity Scenario, Step 7: Recipient's Presence Displayed as Online, Step 7: Recipient's Presence Displayed as Online
roaming, Examining What Happens During Login Processing (Step 3)
screen names added to, How the Provider Migrates Existing MSN Accounts
troubleshooting lists of, Examples of Resolving Common Office Communicator Problems, Examples of Resolving Common Communicator Web Access Problems, Examples of Resolving Common Communicator Web Access Problems
updated, Step 4: Logging In the Contact and Receiving Updated Presence Information
Containers
access levels defined by, Examining What Happens When Controlling the Access Level of a Contact (Step 5)
configuration, Understanding How Office Communications Server Leverages Active Directory
MCU Factories, Understanding How Office Communications Server Leverages Active Directory
presence, Understanding Enhanced Presence, Understanding Categories of Presence Information, Understanding Containers of Presence Information
system, Understanding How Office Communications Server Leverages Active Directory, Understanding How Office Communications Server Leverages Active Directory
Content
in Web conferencing
tools for, Understanding Web Conferencing Content Tools
uploading and downloading, Understanding Web Conferencing Server Content Upload and Download
on Web, Preparing DNS, Firewall Ports, and Certificates for Chicago Deployment, Preparing DNS, Firewall Ports, and Certificates for Chicago Deployment
SPIM control and, Controlling SPIM by Limiting Message Content, Enabling Users for Public IM Connectivity, Enabling Users for Public IM Connectivity
troubleshooting download problems of, Examples of Resolving Common Conferencing Problems, Examples of Resolving Common Conferencing Problems
Content filters, Microsoft Office Communications Server 2007 SDK
Content logging, Examining the RTCsrv.exe Process
Conversations
history of, Overview of Remote Call Control Scenario, Using Voice Mail
Core components of Office Communications, Examining Core Components, Examining the RTChost.exe Process, Examining the RTCsrv.exe Process, Examining the RTChost.exe Process, Examining Presence Components
crand parameter, Overview of NTLM and Kerberos
Credentials, Step 2: Supplying Account Credentials (If Prompted), Examining What Happens After Sign-In Starts (Post Step 1), Understanding Federation
Critical mode, Understanding Meeting Compliance
Custom authentication, Communicator Web Access
Customizing platforms, Customizing the Platform, Additional Resources, Additional Resources

D

Data
backing up, Backing Up Server Settings, Restoring Service, Backing Up Data, Backing Up Databases, Restoring Service, Backing Up File Shares, Restoring Service
completeness of, Planning for Backup and Restore
criticality of, Backup and Restore Requirements
restoring, Building Standby Servers, Restoring Settings in Standard Edition Server Environments, Restoring Databases, Restoring Settings in Standard Edition Server Environments
Data center model architecture, Understanding Contoso's User Distribution, Step 8: Plan for VoIP
Data collaboration conferences, Understanding Data Collaboration, Understanding the Conferencing Architecture, Understanding Web Components
Data Encryption Standard (DES), Overview of TLS
Databases
backup utilities for, Backing Up Databases
data stored in, Backing Up Data, Backing Up Data
for Call Detail Records (CDRs), Reporting Usage Data, Database Schema for the Archiving and CDR Database, Database Schema for the Archiving and CDR Database
for conferencing, Understanding Conferencing Clients, Understanding the Conferencing Server Factory
for line of business (LOB) applications, Backing Up Databases
recovery of, Setting Up Server Platforms, Preparing to Use the Hardware and Software of an Existing Server for Database Recovery, Preparing to Use the Hardware and Software of an Existing Server for Database Recovery
storage of, Step 11: Plan for Database Storage
Datacenter Edition of Windows Server 2003, Enterprise Edition Pool
DBAnalyze tool, Examining What Happens After Sign-In Starts (Post Step 1), Overview of Diagnostic Tools
Deactivation, Understanding Conference Deactivation
Decommissioning servers, Migrating Users from Live Communications Server 2005 SP1 to Office Communications Server 2007
Default domain, Using DNS to Publish Office Communications Server
deleteConference C3P command, Understanding Conference Deactivation
Denial of Service (DoS) attack, Director Role, Examining the Basic Remote Access Scenario in Detail
Department Deployment option, Step 8: Plan for VoIP
Deployment Navigation Tool, Configuring the DVT Agent
Deployment Validation Tool
as diagnostic tool, Overview of Diagnostic Tools
in troubleshooting, Identifying Primary Problem Spaces by Technical Area, Summary of Troubleshooting Steps, Summary of Troubleshooting Steps
server for, Configuring the QoE Monitoring Server, Summary, Configuring the Deployment Validation Tool Server, Configuring the DVT Organizer, Configuring the DVT Agent, Managing DVT by Using the Administrative Console, Summary
Desktop sharing, Overview of Web Conferencing Capabilities, Understanding Data Collaboration, Understanding Meeting Policy and Policy Enforcement
Destination network address translation (DNAT), Examples of Resolving Common Office Communicator Problems
Devices section, Examining What Happens During Login Processing (Step 3)
DIAGNOSTIC messages, Examining How Clients from Two Federated Domains Get Online and Register Presence, Step 1—SUBSCRIBE sip:[email protected] SIP/2.0
Diagnostic tools, Examining What Happens After Sign-In Starts (Post Step 1), Diagnostic Tools and Resources, Overview of Diagnostic Tools, Examples of Problem Events and Troubleshooting Steps, Examples of Normal Events, Examples of Problem Events and Troubleshooting Steps, Using Client and Server Trace Logs, Looking at Trace Files, Understanding Office Communications Server Traces, Example of Gathering a Server Trace, Using Snooper, Summary
event logs as, Using Event Logs, Example of an Expected Event, Examples of Problem Events and Troubleshooting Steps, Understanding Server Events, Examples of Normal Events, Examples of Problem Events and Troubleshooting Steps
event types in, Using Event Logs, Example of an Expected Event, Examples of Problem Events and Troubleshooting Steps
server events in, Understanding Server Events, Examples of Normal Events, Examples of Problem Events and Troubleshooting Steps
scenarios for, Overview of Diagnostic Tools, Using Server Setup Logs, Using Server Setup Logs
server setup logs as, Using Server Setup Logs
settings for, Configuring Settings for All Servers, Configuring Conferencing Server Settings, Configuring Diagnostic Settings, Configuring Conferencing Server Settings
trace logs as
server, Understanding Office Communications Server Traces, Example of Gathering a Server Trace, Using Snooper
Dial plans, Resolving Telephony Problems
Dial strings, Understanding Normalization
Dialing rules, Examining What Happens During Login Processing (Step 3), Examining What Happens During Login Processing (Step 3)
Dialogic media gateway, Bridging VoIP to the PSTN Network by Using a Media Gateway
Diffie-Hellman key exchange, Understanding TLS Certificates
Digest authentication, Understanding Anonymous Users, Understanding Conference Security and Access Types
Direct federation, Understanding Federation, Understanding Direct Federation, Understanding Direct Federation
Direct-Inward Dialing (DID), Understanding Contoso's Telephone Infrastructure, Contoso's Deployment Path for Chicago
Director Server
Communicator Web Access as, Communicator Web Access
in direct federation, Understanding Direct Federation
role of, Director Role, Conferencing Servers, Conferencing Servers
Disaster recovery, Backup and Restore Requirements, Step 8: Restore the Primary Site and Bring It Back Online
Discretionary Access Control LIsts (DACLs), Understanding Federation with Public IM Providers
Distinguished names, Understanding How Office Communications Server Leverages Active Directory
Distribution groups, Understanding Multiparty Instant Messaging
Distribution list (DL) expansions, Web Components Server
DMDel.exe tool, Understanding Web Conferencing Content Tools
DMHash.exe tool, Understanding Web Conferencing Content Tools
DMInsider.exe tool, Understanding Web Conferencing Content Tools
Do Not Disturb (DND) presence state, Understanding the Enhanced Presence Model, Considerations Involving Public IM Providers, Overview of Remote Call Control Scenario, Understanding How Inbound Calls Are Routed
Domain Administrator privileges, Performing the Prep Domain Step
Domain Name Service (DNS).
Access Edge Server discovery by, Single Edge Server
in deployment, Step 3: Plan Your Deployment Path, Office Communications Server 2007 Deployment Example, Establishing a Server Naming Convention
in public IM connectivity, Considerations for Deploying the Public IM Connectivity Scenario
infrastructure of, Using DNS to Publish Office Communications Server
login discovery of, Examining What Happens After Sign-In Starts (Post Step 1), Understanding the Client Conference Joining Sequence
Domains
blocking external, Blocking External Domains
controllers for, Step 4: Prepare Your Infrastructure
DSA.MSC, Configuring Users for Unified Communications
DTMF (dual-tone multifrequency) digits, Overview of Remote Call Control Scenario
Dynamic Host Configuration Protocol (DHCP), Examples of Problem Events and Troubleshooting Steps, Examples of Resolving Common Telephony Problems
Dynamic-link library (DLL), Understanding How Office Communications Server Leverages Active Directory

E

E.164 recommendation, Understanding Normalization, Configuring the DVT Agent
Eavesdropping, Step 6: Plan for External User Access
Edge Server.
calculations for, Step 6: Plan for External User Access, Step 6: Plan for External User Access
deployment example for, Preparing DNS, Firewall Ports, and Certificates for Chicago Deployment
hardware and software requirements for, Access Edge Server
in conferencing, Understanding Process and Machine Boundaries for Conferencing Components, Understanding the Conferencing Protocols, Understanding Edge Servers, Understanding the Conferencing Protocols
in Web conferencing, Access Edge Server, Web Conferencing Edge Server, Web Conferencing Edge Server
internal FQDN of, Performing the Prep Forest Step
Remote Call Control and, Why Consider Remote Call Control?
role of, Edge Servers, A/V Edge Server, Web Conferencing Edge Server, A/V Edge Server
TLS over TCP and, Examining What Happens After Sign-In Starts (Post Step 1)
troubleshooting, Resolving Local and Remote Login Problems and Basic Operational Problems, Examples of Resolving Common Communicator Web Access Problems, Examples of Resolving Common Communicator Web Access Problems
Emoticons, Examining What Happens During Session Establishment and Sending a Message (Post Step 2)
EnableFileTracing value, Examining What Happens During the Initial Launch of Communicator 2007 (Pre-Step 1)
Encrypted File Systems (EFS), Scaling with SQL Server
Encryption keys, Examining What Happens After Sign-In Starts (Post Step 1), Understanding Web Conferencing Server Content Upload and Download
Ending conversations, Examining What Happens When Ending the Conversation (Step 7)
Endpoints, Standard Edition Server, Standard Edition Server
Enhanced federation, Understanding Federation, Understanding Direct Federation
Enhanced file transfer filtering, Controlling SPIM by Limiting Message Content
Enhanced Key Usage (EKU), Configuring for Enhanced Key Usage, Server Authentication, Considerations for Deploying the Public IM Connectivity Scenario, Examples of Resolving Common Office Communicator Problems
Enhanced presence model, Overview of Office Communications Server 2007, Understanding Enhanced Presence, How Enhanced Presence Works, Understanding Categories of Presence Information, Understanding Containers of Presence Information, Examples of Enhanced Presence
as extensible permission model, Standard Edition Server
categories in, Understanding Categories of Presence Information, Understanding Containers of Presence Information, Understanding Containers of Presence Information
characteristics of, How Enhanced Presence Works, Understanding Categories of Presence Information, Understanding Categories of Presence Information
endpoints for, Standard Edition Server
examples of, Examples of Enhanced Presence
Live Communications Server 2003 versus, The Evolution of Office Communications Server 2007
overview of, Overview of IM Conferencing Capabilities
presence containers in, Understanding Enhanced Presence, Understanding Categories of Presence Information, Understanding Containers of Presence Information
presence information types in, Understanding Enhanced Presence, Understanding Enhanced Presence
Enhanced URL filtering, Controlling SPIM by Limiting Message Content, Enabling Users for Public IM Connectivity, Enabling Users for Public IM Connectivity
Enterprise Edition of Office Communications Server 2007, Overview of Office Communications Server 2007, Standard Edition Server, Enterprise Edition Pool
Enterprise pools
in architecture, Examining the Enterprise Edition: Expanded Configuration, Understanding Office Communications Server 2007 Internal Components, Understanding Enterprise Pools, Understanding Office Communications Server 2007 Internal Components
in prep forest step, Performing the Prep Forest Step
overview of, Overview of Office Communications Server 2007, The Evolution of Office Communications Server 2007, The Evolution of Office Communications Server 2007
restoring settings of, Restoring Settings in Enterprise Pool Configurations, Re-creating Enterprise Pools, Step 1: Prepare for Restoration of Settings, Step 2: Restore Settings, Step 4: Start Services, Re-creating Enterprise Pools
computer-level, Step 2: Restore Settings
global-level, Step 2: Restore Settings
importing settings for, Step 2: Restore Settings
preparing for, Step 4: Validate Services, Step 1: Prepare for Restoration of Settings
server activation in, Step 2: Restore Settings
services starting in, Step 4: Start Services
validating functionality in, Step 5: Validate Server and Pool Functionality
Enterprise Voice
architecture example for, Step 8: Plan for VoIP
features in, Overview of Audio/Video Conferencing Capabilities, Overview of Enterprise Voice Capabilities, Overview of Enterprise Voice Capabilities
licenses for, Configuring Location Profiles
Quality of Service metric reports of, Understanding GRUU Creation
troubleshooting
exporting dial plans, Resolving Telephony Problems
login, Examples of Resolving Common Telephony Problems
placing calls, Examples of Resolving Common Telephony Problems
unexpected behavior, Examples of Resolving Common Telephony Problems
voice mail, Examples of Resolving Common Telephony Problems
Enterprise Voice Route Helper
for troubleshooting, Resolving Telephony Problems
in Voice over IP (VoIP), Understanding Phone Usage, Configuring Location Profiles
testing with, Contoso's Deployment Path for Chicago, Contoso's Deployment Path for Chicago
usage example of, Contoso's Deployment Path for Chicago, Contoso's Deployment Path for Chicago
epid parameter, Overview of NTLM and Kerberos
Error event type, Understanding Event Types
Error messages, Examining What Happens During the Initial Launch of Communicator 2007 (Pre-Step 1)
Ethical Wall applications, Microsoft Office Communications Server 2007 SDK
European Computer Manufacturers Association (ECMA), Why Consider Remote Call Control?
Event header, Examining What Happens During Login Processing (Step 3), Examining What Happens During Login Processing (Step 3)
Event logs
Admin Tools access to, Monitoring Overall Status by Using the Status Pane
application, Examining What Happens During the Initial Launch of Communicator 2007 (Pre-Step 1), Examining What Happens After Sign-In Starts (Post Step 1), Examining What Happens After Sign-In Starts (Post Step 1)
as diagnostic tool, Overview of Diagnostic Tools, Configuring Trace Settings, Using Event Logs, Example of an Expected Event, Examples of Problem Events and Troubleshooting Steps, Understanding Server Events, Examples of Normal Events, Examples of Problem Events and Troubleshooting Steps, Configuring Trace Settings
in Microsoft Operations Manager (MOM), Using Computer Groups
Event Viewer, Overview of Diagnostic Tools
Exchange Client Access Server (MRAS), Examples of Resolving Common Telephony Problems
Exchange Mailbox Servers, Examining the Technical Details Behind VoIP Scenarios
Exchange Server 2007 Unified Messaging (UM)
in VoIP, Configuring Call Forwarding, Using Voice Mail, Examining the Technical Details Behind VoIP Scenarios, Understanding How Inbound Calls Are Routed
planning for, Defining the Scenario Selection, Step 1: Determining Key Planning Decisions, Step 8: Plan for VoIP
Expanded configuration, Overview of Office Communications Server 2007
Expanded configuration of Enterprise Edition, Enterprise Edition Pool, Examining the Enterprise Edition: Expanded Configuration
Expanded topology in federation, Comparing Consolidated Topology to Expanded Topology, Understanding On-Premises Conferencing Rules for Federated and Nonfederated Users, Understanding On-Premises Conferencing Rules for Federated and Nonfederated Users
Expiration in conferencing, Understanding Conference Expiration, Understanding the Client Conference Joining Sequence, Understanding the Client Conference Joining Sequence
Exporting
certificates, Examining What Happens After Sign-In Starts (Post Step 1), Examining What Happens After Sign-In Starts (Post Step 1)
dial plans, Resolving Telephony Problems
Extended scenarios for remote access, Remote Access Scenarios, Understanding Extended Remote Access Scenarios
Extensible permission model, Standard Edition Server
External domains, Blocking External Domains
External network interface cards (NIC), Using DNS to Publish Office Communications Server

F

Fault tolerance, Step 10: Plan for High Availability and Fault Tolerance
Federal Deposit Insurance Corporation (FDIC), Why Talk About the Public IM Connectivity Scenario?
Federated Partner Access, Administering Federated Partner Access, Administering Federated Partner Access
Federated Partner Discovery, Understanding Federated Partner Discovery, Configuring and Administering Federation, Administering Federated Partner Access
Federation, Federation Scenario, On the Companion CD, Understanding Federation, Understanding Direct Federation, Understanding Federated Partner Discovery, Understanding Federation with Public IM Providers, Understanding Subject Alternate Name, Comparing Consolidated Topology to Expanded Topology, Configuring and Administering Federation, Configuring an Edge Server for Federation, Administering Federated Partner Access, Managing Multiple User Accounts, Examining the Technical Details Behind the Federation Scenario, Step 1—SUBSCRIBE sip:[email protected] SIP/2.0, Summary, On the Companion CD
communication and, Examining Communication from One Federated Enterprise to Another, Step 19—sip:[email protected];opaque=user:epid:IAnGIHUus1qSUt8ED60SDgAA;gruu SIP/2.0, Step 1—SUBSCRIBE sip:[email protected] SIP/2.0, Step 2—BENOTIFY and OK/200, Step 12—INFO sip:[email protected];opaque=user:epid:rcCqh5A6AVmnmbRnI5LzvwAA;gruu SIP/2.0, Step 13—MESSAGE sip:[email protected];opaque=user:epid:IAnGIHUus1qSUt8ED60SDgAA;gruu SIP/2.0, Step 19—sip:[email protected];opaque=user:epid:IAnGIHUus1qSUt8ED60SDgAA;gruu SIP/2.0
configuring and administering, Overview of Office Communications Server 2007, Configuring and Administering Federation, Configuring User Accounts for Federation, Administering Federated Partner Access, Managing Multiple User Accounts
consolidated versus expanded topology in, Comparing Consolidated Topology to Expanded Topology, Understanding On-Premises Conferencing Rules for Federated and Nonfederated Users, Understanding On-Premises Conferencing Rules for Federated and Nonfederated Users
direct, Understanding Federation, Understanding Direct Federation, Understanding Direct Federation
domain validation in, Federation Domain Validation
Edge Server for, Edge Servers, Access Edge Server, Access Edge Server
enhanced, Understanding Federation
inbound calls from, Understanding How Inbound Calls Are Routed
on-premises conferencing rules in, Configuring an Edge Server for Federation
registering presence and, Examining How Clients from Two Federated Domains Get Online and Register Presence, Step 3—SUBSCRIBE sip:[email protected] SIP/2.0, Step 3—SUBSCRIBE sip:[email protected] SIP/2.0, Step 5—SERVICE sip:[email protected] SIP/2.0
SIP routing and, Route Signatures, Route Signatures
Subject Alternative Name (SAN) certificates in, Understanding Subject Alternate Name, Understanding TLS Certificates, Understanding TLS Certificates
trace filers to diagnose problems with, Example of Gathering a Server Trace, Example of Gathering a Server Trace
Transport Layer Security (TLS) certificates in, Understanding TLS Certificates, Comparing Consolidated Topology to Expanded Topology, Comparing Consolidated Topology to Expanded Topology
with public IM connectivity (PIC), Enabling Federation with Public IM Service Providers, Considerations Involving Public IM Providers, Provisioning Federation with a Public IM Service Provider, Configuring IM Service Providers, Considerations Involving Public IM Providers
provisioning, Provisioning Federation with a Public IM Service Provider
query output sample for, Provisioning Federation with a Public IM Service Provider
settings for, Configuring Per-User and Global Settings
steps in, Considerations for Deploying the Public IM Connectivity Scenario, Enabling Federation with Public IM Service Providers
subscription licenses for, Provisioning Federation with a Public IM Service Provider
usage statistics for, Provisioning Federation with a Public IM Service Provider
File sending, Examining What Happens When Sending a File (Step 5)
File sharing
backing up, Backing Up File Shares
data stored in, Backing Up Databases
restoring, Restoring File Shares
troubleshooting
in point-to-point sessions, Resolving Conferencing Problems Involving Sharing Files and A/V
Filters
content, Microsoft Office Communications Server 2007 SDK
event log, Monitoring Events by Using the Event Log Tab, Using Event Log Filters
for enhanced file transfer, Controlling SPIM by Limiting Message Content
for SPIM control, Controlling SPIM by Limiting Message Content, Enabling Users for Public IM Connectivity, Enabling Users for Public IM Connectivity
message, Overview of the Public IM Connectivity Scenario
settings for, Configuring Settings for Standard Edition and Enterprise Edition Servers, Configuring Logging Settings
trace, Example of Gathering a Server Trace, Example of Gathering a Server Trace
Financial Institution Letter (FIL) 84-2004, Why Talk About the Public IM Connectivity Scenario?
FireFox browser, Overview of Office Communications Server Clients, Communicator Web Access
Firewalls.
Audio-Video Edge Server and, Step 6: Plan for External User Access, Step 7: Plan for Deploying Load Balancers
Communicator Web Access and, Communicator Web Access
ports for, Overview of Preparing Firewall Ports, Certificates, NICs, and DNS, Preparing DNS, Firewall Ports, and Certificates for Chicago Deployment
Focus
C3P request from, Understanding Conference Control
client dialog with, Understanding Conference Activation, Understanding the Client Conference Joining Sequence
conferences and, Understanding Conferencing Servers and the Conferencing Server Factory, Understanding Conference Creation, Examining the Enterprise Edition: Expanded Configuration
definition of, Director Role
description of, Examining Conferencing Components, Understanding the Focus Factory, Understanding the Focus, Understanding the Focus Factory
for IM conferencing, IM Conferencing Server
in architecture, Understanding Focus, Understanding Conferencing Servers and the Conferencing Server Factory, Understanding the Focus Factory, Understanding Conferencing Servers and the Conferencing Server Factory
in Voice over IP (VoIP), Using Ad Hoc Conference Calling
scheduling client and, Understanding Conference Creation
Web Conferencing Server requests from, Understanding the Client Join Sequence to the Web Conferencing Server
Forking, Standard Edition Server, Understanding Conference Control
Forms-based authentication, Communicator Web Access, Enabling Office Communicator Web Access 2007
Forwarding calls, Overview of Remote Call Control Scenario
Foundry Networks ServerIron, Building Redundancy with Hardware Load Balancing
FTP connections, Examining What Happens When Sending a File (Step 5)
Fully qualified domain name (FQDN).
as A (Host) records, Using DNS to Publish Office Communications Server
certificates for, Understanding How Office Communications Server Leverages Active Directory
Common name of certificates and, Configuring the Common Name or Subject Name, Configuring the Subject Alternative Name, Configuring the Subject Alternative Name
for Voice over IP media gateways, Understanding Phone Routes
in public IM connectivity, Provisioning Federation with a Public IM Service Provider
in Remote Call Control, Configuring a Route on the Office Communications Server Pool for Server URI
of Director Server, Director Role
of Edge Server, Performing the Prep Forest Step
of federated Access Edge Server, Understanding Direct Federation
of home servers, Director Role
SIP domain in, Performing the Prep Forest Step

G

getPresence query, Examining What Happens During Looking Up a Contact (Step 1)
Global Catalog (GC), Standard Edition Server, Configuring Global Settings
Global distribution groups, Understanding Multiparty Instant Messaging
Global properties, Managing Multiple User Accounts, Managing Multiple User Accounts
Global security groups, Understanding Multiparty Instant Messaging
Global settings
backing up, Backing Up Pool and Global Settings, Backing Up Data, Backing Up Data
configuration of, Administration, Configuring User-Specific Settings, Configuring Global Settings, Configuring UC-specific Settings, Configuring User-Specific Settings
trusted server, Configuring Trusted Server Settings
container for, Understanding How Office Communications Server Leverages Active Directory, Performing the Prep Forest Step
for enterprise voice, Configuring Global Enterprise Voice Settings
for public IM connnectivity, Enabling Users for Public IM Connectivity, Examining the Technical Details Behind the Public IM Connectivity Scenario, Configuring Per-User and Global Settings, Examining the Technical Details Behind the Public IM Connectivity Scenario
in Active Directory, Understanding How Office Communications Server Leverages Active Directory, Understanding How Office Communications Server Leverages Active Directory
in troubleshooting client connections, Examining What Happens After Sign-In Starts (Post Step 1)
Globally Routable User-Agent URI (GRUU), REGISTER, Understanding the Globally Routable User Agent URI, How the GRUU Is Used by Office Communications Server
Globally unique identifiers (GUIDs), Understanding How Office Communications Server Leverages Active Directory, Restoring Domain Information
Graphical user interface (GUI), Contoso's Deployment Path for Chicago
Greenfield environments, Step 3: Plan Your Deployment Path, Step 8: Plan for VoIP
grid parameter, Understanding the Globally Routable User Agent URI
Group Expansion Web service, Understanding Multiparty Instant Messaging, Understanding Web Components, Examples of Resolving Common Office Communicator Problems
gruu parameter, Understanding the Globally Routable User Agent URI
gssapi-data parameter, Overview of NTLM and Kerberos

H

Handouts, Understanding Data Collaboration
Hardware load balancers (HLB), Enterprise Edition Pool
examples of, Comparing Consolidated Topology to Expanded Topology
external, Preparing DNS, Firewall Ports, and Certificates for Chicago Deployment
for redundancy, Scaling with SQL Server, Bridging VoIP to the PSTN Network by Using a Media Gateway, Building Redundancy with Hardware Load Balancing, Bridging VoIP to the PSTN Network by Using a Media Gateway
internal, Preparing DNS, Firewall Ports, and Certificates for Chicago Deployment
planning for, Step 6: Plan for External User Access, Step 7: Plan for Deploying Load Balancers
Hash Message Authentication Code (HMAC) signature, Step 6: Plan for External User Access
Helpdesk, Contoso's Deployment Path for Chicago
Home server
fully qualified domain name (FQDN) of, Director Role
role of, Server Roles, Standard Edition Server, Standard Edition Server
HTML file format, Understanding Data Collaboration
HTTP Proxy Server, Step 6: Plan for External User Access
HTTP Reverse Proxy Server, Understanding Edge Servers
for publishing Web interfaces, Bridging VoIP to the PSTN Network by Using a Media Gateway, Publishing Web Interfaces to the Internet by Using HTTPS Reverse Proxy, Publishing Web Interfaces to the Internet by Using HTTPS Reverse Proxy
for remote access, Begin Sharing an Application (Step 3), Examining the Web Conferencing Remote Access Scenario in Detail
HTTP URLs, Configuring the CRL Distribution Points
HTTPS channel, Conferencing Servers
Hub Transport (HUB) Server, Step 8: Plan for VoIP
Hyperlink sending, Examining What Happens When Sending a Hyperlink (Step 4)

I

In-band provisioning, Starting Communicator 2007, Understanding Normalization, SUBSCRIBE and NOTIFY Requests, How the GRUU Is Used by Office Communications Server
In-meeting chat, Understanding Data Collaboration, Understanding Conferencing Clients
Inbound call routing, Understanding How Inbound Calls Are Routed, Understanding Normalization, Configuring the Media Gateway, Configuring the Mediation Server
INFO message, Examining What Happens When Receiving a Message (Step 3)
Information and Content Exchange (ICE) protocol, A/V Edge Server
Information event type, Understanding Event Types
Infrastructure, Infrastructure and Security Considerations, On the Companion CD, Performing the Prep Forest Step, Using DNS to Publish Office Communications Server, On the Companion CD
Active Directory in, Understanding How Office Communications Server Leverages Active Directory, Performing the Prep Forest Step, Performing the Prep Forest Step
global settings and, Understanding How Office Communications Server Leverages Active Directory
prep forest step and, Performing the Prep Forest Step
hardware load balancing for redundancy in, Building Redundancy with Hardware Load Balancing, Bridging VoIP to the PSTN Network by Using a Media Gateway, Bridging VoIP to the PSTN Network by Using a Media Gateway
media gateway for VOIP-PSTN bridging in, Bridging VoIP to the PSTN Network by Using a Media Gateway, Publishing Web Interfaces to the Internet by Using HTTPS Reverse Proxy, Publishing Web Interfaces to the Internet by Using HTTPS Reverse Proxy
of Domain Name Service, Performing the Prep Domain Step, Securing Office Communications Server with PKI, Using DNS to Publish Office Communications Server, Securing Office Communications Server with PKI
Private Key (PKI), Securing Office Communications Server with PKI, Scaling with SQL Server, Scaling with SQL Server
SQL Server scaling and, Scaling with SQL Server, Building Redundancy with Hardware Load Balancing, Building Redundancy with Hardware Load Balancing
Installation, Examples of Resolving Common Management and Configuration Problems
Instant Messaging (IM), Overview of Office Communications Server 2007, Basic IM and Presence Scenarios, Examining What Happens When Controlling the Access Level of a Contact (Step 5), Step 2: Typing and Sending a Message, Step 4: Sending a Hyperlink, Examining the Technical Details Behind the Instant Messaging Scenario, Examining What Happens During Session Establishment and Sending a Message (Post Step 2), Examining What Happens When Receiving a Message (Step 3), Examining What Happens When Sending a File (Step 5), Examining What Happens When Ending the Conversation (Step 7)
Conferencing Server for, Overview of Office Communications Server 2007, Conferencing Servers, IM Conferencing Server, Overview of the Public IM Connectivity Scenario
conversation ending in, Examining What Happens When Ending the Conversation (Step 7)
multiparty, Understanding Conferencing Media Types, Understanding Conferencing Clients, Understanding Conference Creation
overview of, Overview of IM Conferencing Capabilities, Overview of Web Conferencing Capabilities, Overview of the Instant Messaging Scenario, Step 2: Typing and Sending a Message, Step 5: Sending a File, Examining the Technical Details Behind the Instant Messaging Scenario
public providers of, Understanding Federation, Understanding Federation with Public IM Providers
receiving, Examining What Happens When Receiving a Message (Step 3), Examining What Happens When Sending a Hyperlink (Step 4), Examining What Happens When Sending a Hyperlink (Step 4)
remote access for, Understanding Basic Remote Access for IM and Presence, Examining the Basic Remote Access Scenario in Detail, Examining the Basic Remote Access Scenario in Detail
reply to calls with, Overview of Remote Call Control Scenario
session establishment in, Step 6: Sharing Video, Examining What Happens During Session Establishment and Sending a Message (Post Step 2), Examining What Happens During Session Establishment and Sending a Message (Post Step 2)
SPIM on, Administering Federated Partner Access
Integrated Windows authentication, Communicator Web Access, Understanding Conference Security and Access Types, Enabling Office Communicator Web Access 2007, Restoring Databases
Intelligent Instant Messaging Filter (IM Filter), Examining What Happens When Sending a File (Step 5), Controlling SPIM by Limiting Message Content, Allowing URLs and File Transfers, Examining the RTChost.exe Process
Inter-Process Communication (IPC), Examining the RTCsrv.exe Process
Interactive Connectivity Establishment (ICE), Understanding Edge Servers, Understanding Audio and Video Conferencing Remote Access, Configuring the Mediation Server, Step 6: Plan for External User Access
Intermediate Certification Authorities, Examples of Resolving Common Office Communicator Problems
International public telecommunication numbering plan, Understanding Normalization
International Telecommunications Union (Telecom) Standardization Committee, Understanding Normalization
Internet Engineering Task Force (IETF), Understanding the Conferencing Protocols, Step 6: Plan for External User Access, Understanding Session Initiation Protocol
Internet Explorer, Overview of Office Communications Server Clients, Communicator Web Access, Enabling Office Communicator Web Access 2007
Internet Information Services (IIS), Understanding Web Components, Examples of Resolving Common Conferencing Problems, Resolving Management and Configuration Problems
Internet Protocol (IP), Understanding Audio and Video Conferencing Remote Access
Internet Security and Acceleration (ISA) Server, Access Edge Server, Communicator Web Access, Step 6: Plan for External User Access
INVITE message, Examining What Happens When Receiving a Message (Step 3), INVITE and MESSAGES, ACK, Route Signatures

L

LC Services subnode, Understanding How Office Communications Server Leverages Active Directory
LCSDiscover tool, Overview of Diagnostic Tools
Lcserror.exe, Examining What Happens During the Initial Launch of Communicator 2007 (Pre-Step 1)
Licenses, Considerations for Deploying the Public IM Connectivity Scenario, Provisioning Federation with a Public IM Service Provider
Line of business (LOB) database applications, Backing Up Databases
Live Communications Server
Guides Community of, Summary of Troubleshooting Steps
migrating from, Migrating Users from Live Communications Server 2005 SP1 to Office Communications Server 2007, Migrating Users from Live Communications Server 2005 SP1 to Office Communications Server 2007
Live Meeting
overview of, Telephony Conferencing Server
Web conferences in, Understanding Conferencing Clients
.LMP files, Understanding Web Conferencing Server Content Upload and Download
Local area networks (LANs), Understanding Contoso's Network Infrastructure
Location profiles, Examining What Happens During Login Processing (Step 3)
in deployment example, Contoso's Deployment Path for Chicago, Contoso's Deployment Path for Chicago
in prep forest step, Performing the Prep Forest Step
in Voice over IP (VoIP), Understanding Normalization, Configuring Phone Routes, Configuring Location Profiles
WMI class for, Configuring UC-specific Settings
Logging, Configuring Logging Settings, Overview of Diagnostic Tools, Understanding Office Communications Server Traces, Example of Gathering a Server Trace
Login, Basic IM and Presence Scenarios, Understanding Post-Login Processing (Post-Step 4), Understanding the Login Process, Step 3: The Login Process, Examining the Technical Details Behind the Login Process, Examining What Happens During the Initial Launch of Communicator 2007 (Pre-Step 1), Examining What Happens After Sign-In Starts (Post Step 1), Examining What Happens During Login Processing (Step 3), Understanding Post-Login Processing (Post-Step 4)
initial launch in, Examining What Happens During the Initial Launch of Communicator 2007 (Pre-Step 1), Examining What Happens After Sign-In Starts (Post Step 1), Examining What Happens After Sign-In Starts (Post Step 1)
overview of, Overview of the Login Process, Step 4: Login Complete, Step 3: The Login Process, Step 4: Login Complete, Examining the Technical Details Behind the Login Process
post processing of, Understanding Post-Login Processing (Post-Step 4)
processing of, Examining What Happens During Login Processing (Step 3)
sign-in in, Examining What Happens After Sign-In Starts (Post Step 1), Examining What Happens After Sign-In Starts (Post Step 1)
authenticated registration in, Examining What Happens After Sign-In Starts (Post Step 1), Examining What Happens During Login Processing (Step 3)
connectivity establishment in, Examining What Happens After Sign-In Starts (Post Step 1)
DNS discovery in, Examining What Happens After Sign-In Starts (Post Step 1)
initial registration in, Examining What Happens After Sign-In Starts (Post Step 1)
troubleshooting, Resolving Local and Remote Login Problems and Basic Operational Problems, Examples of Resolving Common Office Communicator Problems
common problems, Examples of Resolving Common Office Communicator Problems
error code resolution in, Resolving Common Problem Scenarios, Resolving Local and Remote Login Problems and Basic Operational Problems
fully qualified domain names, Examples of Resolving Common Office Communicator Problems
simple configuration for, Examples of Resolving Common Office Communicator Problems
voice communications, Resolving Telephony Problems, Examples of Resolving Common Telephony Problems
Web access, Examples of Resolving Common Communicator Web Access Problems
LS WebComponents Services subnode, Understanding How Office Communications Server Leverages Active Directory

M

Mailbox (MBX) Server, Step 8: Plan for VoIP
Man-in-the-middle attacks, Examining the Basic Remote Access Scenario in Detail, Security Features of Office Communications Server 2007
MCU Health Report, Using Snooper
MCUs (Multipoint Conferencing Units), Conferencing Servers
Media Gateway Control Protocol (MEGACO), Understanding Session Initiation Protocol
Media gateways
advanced, Configuring the Mediation Server
for SIP-PSTN connection, Step 8: Plan for VoIP, Step 8: Plan for VoIP
in Voice over IP (VoIP), Examining the Technical Details Behind VoIP Scenarios, Understanding How Inbound Calls Are Routed, Configuring VoIP, Configuring VoIP
Media protocols, Understanding the Conferencing Protocols, Understanding the Conferencing Protocols
Media Relay Access Server (MRAS), Examples of Resolving Common Telephony Problems, How the GRUU Is Used by Office Communications Server
Media sharing, Considerations Involving Media Sharing
Media types, Understanding Conferencing Media Types, Understanding Data Collaboration, Understanding the Conferencing Architecture, Understanding Focus
Mediation Server, Overview of Office Communications Server 2007
for basic media gateway, Configuring Users for Unified Communications
in Voice over IP (VoIP), Configuring the Media Gateway, Configuring the Mediation Server
placement of, Understanding Contoso's User Distribution
RT Audio translation by, Bridging VoIP to the PSTN Network by Using a Media Gateway
trusted, Understanding How Office Communications Server Leverages Active Directory
Meet Now, Understanding Data Collaboration
Meetings.
compliance in, Understanding Meeting Compliance, Understanding Meeting Compliance
large, Understanding Conferencing Servers and the Conferencing Server Factory, Understanding Web Components, Understanding Web Components
maximum attendees for, Examples of Resolving Common Conferencing Problems, Resolving Management and Configuration Problems, Resolving Management and Configuration Problems
policy for, Performing the Prep Forest Step, Understanding Conferencing Servers and the Conferencing Server Factory, Understanding Meeting Policy and Policy Enforcement
policy-specific settings for, Configuring Policy-Specific Settings, Configuring Service Connection Point Settings, Configuring Service Connection Point Settings
MESSAGE message, Examining What Happens When Receiving a Message (Step 3), Examining What Happens When Sending a Hyperlink (Step 4), Examining What Happens When Sending a Hyperlink (Step 4)
Message Queuing, Prerequisites for Deploying the Archiving and CDR Service, Monitoring Usage, Deploying the Archiving and CDR Service, Monitoring Usage
MESSAGES, INVITE and MESSAGES
Messages.
authentication and, Overview of NTLM and Kerberos
integrity of, TLS and MTLS for Client and Server Message Integrity, Additional Resources, Additional Resources
Microsoft Business Agreement, Provisioning Federation with a Public IM Service Provider
Microsoft Clustering Service (MSCS), Enterprise Edition Pool
Microsoft Conferencing Add-in, Understanding Conferencing Clients, Understanding the Conferencing Database, Understanding the Conferencing Database
Microsoft Forums, Summary of Troubleshooting Steps
Microsoft IT (MSIT) environment, Step 5: Review System and Network Requirements
Microsoft Management Console (MMC)
automatic server population and, Understanding How Office Communications Server Leverages Active Directory
conference capacity and, Understanding Conferencing Servers and the Conferencing Server Factory
for Admin Tools, Monitoring Office Communications Server by Using the Admins Tools
in deployment example, Contoso's Deployment Path for Chicago
in VoIP, Configuring Global Enterprise Voice Settings
Microsoft Network (MSN), Provisioning Federation with a Public IM Service Provider, Considerations Involving Public IM Providers
Microsoft Office Document Imaging (MODI) support, Understanding Data Collaboration, Understanding Web Conferencing Server Content Upload and Download
Microsoft Office RoundTable, Understanding On-Premises Conferencing Rules for Federated and Nonfederated Users, Step 8: Plan for VoIP
Microsoft Operations Manager (MOM), Configuring the QoE Monitoring Server, Monitoring, Monitoring Office Communications Server 2007 by Using Microsoft Operations Manager 2005, Using Computer Groups, Using Tasks, Monitoring Office Communications Server Usage by Using Call Detail Records
Microsoft Product Support Services, Summary of Troubleshooting Steps
Microsoft SIP Processing Language (MSSPL), Examining the RTCsrv.exe Process
Microsoft SQL Server Desktop Engine (MSDE) database, Server Roles, Standard Edition Server, Standard Edition Server
Microsoft Unified Communications Managed API software development kit (SDK), Examining the Technical Details Behind VoIP Scenarios
Microsoft Volume Licensing agreement, Enabling Federation with Public IM Service Providers, Provisioning Federation with a Public IM Service Provider
Migration, Resolving Common Problem Scenarios
Missed calls, Overview of Remote Call Control Scenario, Using Voice Mail, Examples of Resolving Common Telephony Problems
Mobile devices, Remote Access Scenarios, Enabling Office Communicator Mobile Access 2007, Examining a COMO Topology, Deploying Certificates for COMO, Understanding Remote Call Control Scenario, Configuring Call Deflection
Monitoring, Monitoring, On the Companion CD, Monitoring Office Communications Server by Using the Admins Tools, Monitoring Events by Using the Event Log Tab, Using Event Log Filters, Monitoring Performance by Using the Performance Tab, Monitoring Office Communications Server 2007 by Using Microsoft Operations Manager 2005, Using Computer Groups, Monitoring Office Communications Server Usage by Using Call Detail Records, Monitoring Usage, Reporting Usage Data, On the Companion CD
Admin Tools for, Monitoring Overall Status by Using the Status Pane, Monitoring Office Communications Server 2007 by Using Microsoft Operations Manager 2005, Monitoring Office Communications Server 2007 by Using Microsoft Operations Manager 2005
event log tab, Monitoring Events by Using the Event Log Tab, Using Event Log Filters
status pane, Monitoring Overall Status by Using the Status Pane
Microsoft Operations Manager (MOM) for, Using Computer Groups
server for, Examining the Technical Details Behind VoIP Scenarios
Move Users Wizard, Reassigning Users, Migrating Users from Live Communications Server 2005 SP1 to Office Communications Server 2007
Mozilla Firefox browser, Enabling Office Communicator Web Access 2007
msRTCSIP-Pool class, Understanding How Office Communications Server Leverages Active Directory
Multimedia content, Understanding Data Collaboration
Multiple Points of Presence (MPOP), Understanding Categories of Presence Information
Multiple-Site Edge Server, Comparing Consolidated Topology to Expanded Topology
Multipoint control unit (MCU) factory
conferencing server role in, Understanding Conferencing Servers and the Conferencing Server Factory
for conference media types, Examining What Happens During Login Processing (Step 3), Examining What Happens During Login Processing (Step 3)
in infrastructure, Understanding How Office Communications Server Leverages Active Directory, Performing the Prep Forest Step
Multisite Edge topology, Step 6: Plan for External User Access
Mute speaker, Overview of Audio/Video Conferencing Capabilities
Mutual Communicator Web Access (CWA), Examples of Resolving Common Communicator Web Access Problems
Mutual Transport Layer Security (MTLS), Examining What Happens After Sign-In Starts (Post Step 1), Enabling Office Communicator Web Access 2007, Overview of the Public IM Connectivity Scenario, Considerations for Deploying the Public IM Connectivity Scenario, TLS and MTLS for Client and Server Message Integrity
Mutually Transport Layer Security (MTLS), Examples of Problem Events and Troubleshooting Steps

N

Naming conventions for servers, Establishing a Server Naming Convention, Preparing the Server Hardware, Preparing the Server Hardware
Network Address Translation (NAT) protocol, Understanding Edge Servers, Single-Site Edge Topology, Understanding Audio and Video Conferencing Remote Access, Configuring the Mediation Server, Step 6: Plan for External User Access, Troubleshooting Sign-in Problems
Network interface cards (NICs), Understanding Contoso's Deployment Process for Office Communications Server 2007
Network Monitor tool, Overview of Diagnostic Tools
Network perimeter, Edge Servers
Next Hop Connection, Configuring the Mediation Server
Nondeterministic configuration, Director Role
Normalization
functions of, Understanding the Translation Service
in Voice over IP (VoIP), Configuring Global Enterprise Voice Settings, Configuring Voice Policies
location, Performing the Prep Forest Step
location profile from, Contoso's Deployment Path for Chicago, Contoso's Deployment Path for Chicago
phone number, Overview of Remote Call Control Scenario
regular expressions (regex) for, Contoso's Deployment Path for Chicago
rules of, Contoso's Deployment Path for Chicago, Contoso's Deployment Path for Chicago
Nortel Application Switch, Building Redundancy with Hardware Load Balancing
Note sharing, Overview of Web Conferencing Capabilities, Understanding Data Collaboration, Understanding Conferencing Clients, Overview of Remote Call Control Scenario
Notification
best-effort, Examining What Happens During Login Processing (Step 3)
of missed calls, Overview of Remote Call Control Scenario, Using Voice Mail
of presence, Basic IM and Presence Scenarios
NOTIFY message, SUBSCRIBE and NOTIFY Requests, Route Signatures
NT LAN Manager (NTLM) authentication, Communicator Web Access
enabling version 2 of, Troubleshooting Sign-in Problems
for conferencing, Understanding Conferencing User Types
for Instant Messaging, Examining What Happens After Sign-In Starts (Post Step 1)
for remote access, Understanding Basic Remote Access Topologies
Session Initiation Protocol (SIP) and
examples of, Overview of NTLM and Kerberos
NTBackup-File system backup solution, Backup and Restore Requirements

O

Office Communications 2007 Server software development kit (SDK), Customizing the Platform, Microsoft Office Communications Server 2007 SDK, Configuring Pool Settings
Office Communications Server 2007 deployment example, Office Communications Server 2007 Deployment Example, On the Companion CD, Understanding Contoso's Deployment Process for Office Communications Server 2007, Establishing a Server Naming Convention, Preparing the Server Hardware, Contoso's Deployment Path, Overview of Preparing Firewall Ports, Certificates, NICs, and DNS, Preparing DNS, Firewall Ports, and Certificates for Chicago Deployment, Preparing DNS and Firewall Ports for the Paris Deployment, Preparing DNS and Firewall Ports for the Singapore Deployment, Contoso's Deployment Path for Chicago, Contoso's Deployment Path for Paris, Contoso's Deployment Path for Madrid, Contoso's Deployment Path for Singapore, Final Contoso Architecture, On the Companion CD
architecture in, Final Contoso Architecture
Director Server array in, Preparing DNS, Firewall Ports, and Certificates for Chicago Deployment, Preparing DNS, Firewall Ports, and Certificates for Chicago Deployment
Edge Server in, Preparing DNS, Firewall Ports, and Certificates for Chicago Deployment
Enterprise Voice Route Helper in, Contoso's Deployment Path for Chicago, Contoso's Deployment Path for Chicago
external load balancers in, Preparing DNS, Firewall Ports, and Certificates for Chicago Deployment
front end servers in, Preparing DNS, Firewall Ports, and Certificates for Chicago Deployment, Preparing DNS, Firewall Ports, and Certificates for Chicago Deployment
HTTP Reverse Proxy Server in, Preparing DNS, Firewall Ports, and Certificates for Chicago Deployment
infrastructure requirements in, Overview of Preparing Firewall Ports, Certificates, NICs, and DNS, Preparing DNS, Firewall Ports, and Certificates for Chicago Deployment, Preparing DNS and Firewall Ports for the Paris Deployment, Preparing DNS and Firewall Ports for the Madrid Deployment, Preparing DNS and Firewall Ports for the Singapore Deployment
internal load balancers in, Preparing DNS, Firewall Ports, and Certificates for Chicago Deployment
Mediation Server in, Preparing DNS, Firewall Ports, and Certificates for Chicago Deployment, Preparing DNS and Firewall Ports for the Paris Deployment, Preparing DNS and Firewall Ports for the Paris Deployment
normalization rules in, Contoso's Deployment Path for Chicago, Contoso's Deployment Path for Chicago
path in, Contoso's Deployment Path, Overview of Preparing Firewall Ports, Certificates, NICs, and DNS, Contoso's Deployment Path for Chicago, Contoso's Deployment Path for Paris, Contoso's Deployment Path for Singapore
route testing in, Contoso's Deployment Path for Chicago, Contoso's Deployment Path for Chicago
routes in, Contoso's Deployment Path for Chicago, Contoso's Deployment Path for Chicago
server preparation in, Establishing a Server Naming Convention
SQL cluster servers in, Preparing DNS, Firewall Ports, and Certificates for Chicago Deployment, Preparing DNS, Firewall Ports, and Certificates for Chicago Deployment
Web Conferencing Server array in, Preparing DNS, Firewall Ports, and Certificates for Chicago Deployment, Preparing DNS, Firewall Ports, and Certificates for Chicago Deployment
Web Content Server array in, Preparing DNS, Firewall Ports, and Certificates for Chicago Deployment
Office Communications Server 2007 Management Console, Examining What Happens After Sign-In Starts (Post Step 1)
Office Communications Server 2007 overview, Overview of Office Communications Server 2007, On the Companion CD, The Evolution of Office Communications Server 2007, Understanding the Enhanced Presence Model, Overview of IM Conferencing Capabilities, Overview of Web Conferencing Capabilities, Overview of Audio/Video Conferencing Capabilities, Overview of Office Communications Server Clients, Microsoft Unified Communications Managed API SDK, Summary, On the Companion CD
clients of, Overview of Office Communications Server Clients, Overview of Office Communications Server Clients
enhanced presence model of, Understanding the Enhanced Presence Model, Overview of IM Conferencing Capabilities, Overview of IM Conferencing Capabilities
Enterprise Voice in, Overview of Enterprise Voice Capabilities, Overview of Enterprise Voice Capabilities
evolution of, The Evolution of Office Communications Server 2007, The Evolution of Office Communications Server 2007
platform customization in, Customizing the Platform, Additional Resources, Additional Resources
scale of, Understanding Conferencing Servers and the Conferencing Server Factory
Web Conferencing in, Overview of IM Conferencing Capabilities
Office Communications Server 2007 planning example, Office Communications Server 2007 Planning Example, On the Companion CD, Understanding Contoso's Infrastructure, Understanding Contoso's User Distribution, Defining the Deployment Goals, Defining the Scenario Selection, Understanding Contoso's Office Communications Server 2007 Planning Process, Step 1: Determining Key Planning Decisions, Step 3: Plan Your Deployment Path, Step 4: Prepare Your Infrastructure, Step 5: Review System and Network Requirements, Step 6: Plan for External User Access, Step 7: Plan for Deploying Load Balancers, Step 8: Plan for VoIP, Step 9: Plan for Address Book Server, Step 12: Plan for Compliance and Usage Analysis, On the Companion CD
compliance and usage analysis in, Step 12: Plan for Compliance and Usage Analysis, Step 12: Plan for Compliance and Usage Analysis
database storage in, Step 11: Plan for Database Storage
deployment goals in, Defining the Deployment Goals, Understanding Contoso's Office Communications Server 2007 Planning Process, Defining the Scenario Selection, Defining the Reliability Requirements, Understanding Contoso's Office Communications Server 2007 Planning Process
deployment path in, Step 3: Plan Your Deployment Path, Step 4: Prepare Your Infrastructure, Step 4: Prepare Your Infrastructure
external user access in, Step 5: Review System and Network Requirements, Step 7: Plan for Deploying Load Balancers, Step 6: Plan for External User Access, Step 7: Plan for Deploying Load Balancers
Edge Server architecture for, Step 6: Plan for External User Access
firewall configurations for, Step 6: Plan for External User Access
high availability and fault tolerance in, Step 10: Plan for High Availability and Fault Tolerance
infrastructure issues in, Understanding Contoso's Infrastructure, Defining the Scenario Selection, Understanding Contoso's Server Infrastructure, Understanding Contoso's Network Infrastructure, Understanding Contoso's Telephone Infrastructure, Defining the Scenario Selection
infrastructure preparation in, Step 3: Plan Your Deployment Path, Step 4: Prepare Your Infrastructure, Step 4: Prepare Your Infrastructure
key decisions in, Step 1: Determining Key Planning Decisions
load balancers in, Step 7: Plan for Deploying Load Balancers, Step 7: Plan for Deploying Load Balancers
system and network requirements in, Step 5: Review System and Network Requirements, Step 6: Plan for External User Access
topology selection in, Step 1: Determining Key Planning Decisions, Step 3: Plan Your Deployment Path, Step 2: Select Your Topology, Step 3: Plan Your Deployment Path
VoIP in, Step 8: Plan for VoIP, Step 8: Plan for VoIP
Office Communications Server 2007 Planning Guide, Examples of Resolving Common Conferencing Problems
Office Communications Server 2007 Resource Kit Tools, Examining What Happens During the Initial Launch of Communicator 2007 (Pre-Step 1), Examining What Happens After Sign-In Starts (Post Step 1), Understanding Web Conferencing Content Tools, Provisioning Federation with a Public IM Service Provider, Configuring Global Enterprise Voice Settings, Examples of Problem Events and Troubleshooting Steps, Resolving Common Problem Scenarios
Office Communications Server Logger, Resolving Common Problem Scenarios
Office Communications Server Technical Reference, Summary of Troubleshooting Steps, Summary of Troubleshooting Steps
Office Communicator 2005, Overview of Office Communications Server Clients
Office Communicator 2007 software development kit (SDK), Microsoft Office Communicator 2007 SDK
Office Communicator Mobile 2005, Overview of Office Communications Server Clients, Overview of Office Communications Server Clients
Office Communicator Mobile Access (COMO) 2007, Overview of Office Communications Server Clients, Remote Access Scenarios, Enabling Office Communicator Mobile Access 2007, Deploying Certificates for COMO
Office Communicator Phone Edition.
planning for, Step 2: Select Your Topology
Office Communicator Web Access (CWA) 2007, Enabling Office Communicator Web Access 2007, Enabling Office Communicator Web Access 2007, Enabling Office Communicator Mobile Access 2007
incoming ports for, Enabling Office Communicator Web Access 2007
topology of, Enabling Office Communicator Web Access 2007
Offiline notification, Examining What Happens When Adding a Contact (Step 2), Examining What Happens When the Contact Logs In and Updated Presence Is Received (Step 4)
One-time scheduled conferences, Understanding Conference Expiration
OneNote, Overview of Audio/Video Conferencing Capabilities, Overview of Remote Call Control Scenario
opaque parameter, Understanding Conference Creation, Examining the Web Conferencing Remote Access Scenario in Detail, Understanding the Globally Routable User Agent URI, Overview of NTLM and Kerberos
Open authenticated conference, Understanding the Open Authenticated Conference, Understanding the Anonymous Allowed Conference, Understanding the Anonymous Allowed Conference
Organizational unit (OU), Performing the Prep Forest Step, Controlling Spim by Limiting Public Contacts
Organizer
as conference role, Understanding Conferencing User Roles
Outbound routing, Examining the Technical Details Behind VoIP Scenarios, Understanding How Outbound Calls Are Routed, Understanding Voice Policies, Understanding Phone Routes, Configuring the Media Gateway, Configuring the Mediation Server
Outlook 2007
Conferencing Add-in for, Telephony Conferencing Server, Understanding Audio and Video Conferencing, Understanding Conferencing Clients
Live Communications Server 2003 and, The Evolution of Office Communications Server 2007

P

Packet injection, Step 6: Plan for External User Access
PC-to-PC communications, Configuring Per-User and Global Settings
Performance counters, Using Events and Performance Counters
Performance monitoring
of conferencing architecture, Understanding Conferencing Servers and the Conferencing Server Factory, Understanding Conferencing Servers and the Conferencing Server Factory
Perimeter network, Understanding Edge Servers
PERL (Practical Extraction and Report Language), Looking at Trace Files
Permissions
Active Directory and, Understanding How Office Communications Server Leverages Active Directory
stored on home server, Standard Edition Server, Standard Edition Server
Persistent identity, Understanding Federated Users
Persistent Shared Object Model (PSOM), Web Conferencing Server, Understanding Conferencing Servers and the Conferencing Server Factory, Understanding Web Conferencing Server Content Upload and Download
Personal access, Understanding the Enhanced Presence Model
Personal Information Manager panel, Overview of the Public IM Connectivity Scenario
Phishing attacks, Allowing URLs and File Transfers
Phone Normalization Logic, Understanding Normalization
Phone number normalization, Overview of Remote Call Control Scenario, Starting Communicator 2007
Phone routes, Performing the Prep Forest Step
Phone Usage records, Contoso's Deployment Path for Chicago, Contoso's Deployment Path for Chicago
Picstats.sql script, Provisioning Federation with a Public IM Service Provider
ping.exe, Examining What Happens After Sign-In Starts (Post Step 1)
.PNG files, Understanding Web Conferencing Server Content Upload and Download
Pocket PC, Enabling Office Communicator Mobile Access 2007
Point-to-point sessions, Resolving Conferencing Problems Involving Sharing Files and A/V
Policies
compression enabling in, Examining What Happens After Sign-In Starts (Post Step 1)
for conference administration, Understanding Conference Security and Access Types
for Enterprise Voice, Configuring Voice Policies, Configuring Users for Unified Communications
for meetings, Performing the Prep Forest Step, Understanding Meeting Policy and Policy Enforcement
from phone usage records and routes, Contoso's Deployment Path for Chicago, Contoso's Deployment Path for Chicago
location profiles and, Understanding Normalization
Unified Communication, Performing the Prep Forest Step, Examining What Happens During Login Processing (Step 3)
Polling, Overview of Web Conferencing Capabilities, Understanding Data Collaboration, Understanding Conferencing Clients
Ports
for firewalls, Contoso's Deployment Path, Preparing DNS, Firewall Ports, and Certificates for Chicago Deployment, Overview of Preparing Firewall Ports, Certificates, NICs, and DNS, Preparing DNS, Firewall Ports, and Certificates for Chicago Deployment
for Office Communicator Web Access (CWA) 2007, Enabling Office Communicator Web Access 2007
requirements for, Step 6: Plan for External User Access, Step 7: Plan for Deploying Load Balancers, Step 7: Plan for Deploying Load Balancers
PowerPoint presentations
in conferencing, Understanding Data Collaboration, Understanding Web Conferencing Server Content Upload and Download, Understanding Meeting Policy and Policy Enforcement
in Web conferencing, Overview of IM Conferencing Capabilities
Prep domain step, Understanding How Office Communications Server Leverages Active Directory, Performing the Prep Domain Step
Prep forest step, Understanding How Office Communications Server Leverages Active Directory, Performing the Prep Forest Step, Performing the Prep Forest Step, Performing the Prep Domain Step
Prep schema step, Performing the Prep Schema Step
Presence, Understanding How Presence Information Is Shared, Overview of the Instant Messaging Scenario, Step 4: Logging In the Contact and Receiving Updated Presence Information, Examining What Happens During Looking Up a Contact (Step 1), Examining What Happens When Subscribing for Presence and Receiving an Offline Notification (Step 3), Examining What Happens When the Contact Logs In and Updated Presence Is Received (Step 4), Examining What Happens When Controlling the Access Level of a Contact (Step 5), Overview of the Instant Messaging Scenario
access levels in, Examining What Happens When Controlling the Access Level of a Contact (Step 5), Overview of the Instant Messaging Scenario, Overview of the Instant Messaging Scenario
components for, Examining the RTChost.exe Process, Examining Conferencing Components, Examining Conferencing Components
contact addition and, Examining What Happens When Adding a Contact (Step 2), Examining What Happens When Adding a Contact (Step 2)
contact lookup and, Step 5: Controlling the Access Level of a Contact, Examining What Happens When Adding a Contact (Step 2), Examining What Happens During Looking Up a Contact (Step 1), Examining What Happens When Adding a Contact (Step 2)
definition of, What Is Presence?
federated clients registering, Examining How Clients from Two Federated Domains Get Online and Register Presence, Step 3—SUBSCRIBE sip:[email protected] SIP/2.0, Step 3—SUBSCRIBE sip:[email protected] SIP/2.0
Live Communication Server 2005 issues in, Migrating Users from Live Communications Server 2005 SP1 to Office Communications Server 2007
overview of, Basic IM and Presence Scenarios, Overview of the Presence Sharing Scenario, Step 2: Adding a Contact, Step 3: Receiving an Offline Indication, Step 4: Logging In the Contact and Receiving Updated Presence Information, Examining the Technical Details Behind the Presence Sharing Scenario
RTC Aggregate application for, Examining the RTChost.exe Process
subscribing for, Examining What Happens During Login Processing (Step 3), Examining What Happens When Subscribing for Presence and Receiving an Offline Notification (Step 3)
updated, Examining What Happens When the Contact Logs In and Updated Presence Is Received (Step 4)
Primary Rate Interface-Basic Rate Interface (PRI-BRI) lines, Configuring the Media Gateway
Primary scenarios for remote access, Remote Access Scenarios
Privacy, Examining What Happens When Receiving a Message (Step 3)
Private Branch eXchange (PBX)
media gateway connected to, Overview of Office Communications Server 2007
Office Communicator 2005 and, The Evolution of Office Communications Server 2007
Private Key Infrastructure (PKI)
certificates and, Using DNS to Publish Office Communications Server, Scaling with SQL Server, Configuring the Subject Alternative Name, Configuring the Certification Path, Scaling with SQL Server
in federation, Understanding Subject Alternate Name, Comparing Consolidated Topology to Expanded Topology, Understanding TLS Certificates, Comparing Consolidated Topology to Expanded Topology
planning deployment and, Step 3: Plan Your Deployment Path, Step 4: Prepare Your Infrastructure
Product Support Services (PSS), Examining What Happens During the Initial Launch of Communicator 2007 (Pre-Step 1), Examples of Normal Events
Program sharing, Understanding Meeting Policy and Policy Enforcement
Protocol logs, Examining What Happens During the Initial Launch of Communicator 2007 (Pre-Step 1), Examining What Happens During the Initial Launch of Communicator 2007 (Pre-Step 1)
Protocol optimizations, Examining What Happens During Login Processing (Step 3)
Protocol stack, Examining the RTCsrv.exe Process, Examining the RTChost.exe Process, Examining the RTChost.exe Process
Protocol translation, Bridging VoIP to the PSTN Network by Using a Media Gateway
Provisioning
conference server from Focus, Understanding Conference Activation
federation, Enabling Federation with Public IM Service Providers, Provisioning Federation with a Public IM Service Provider, Provisioning Federation with a Public IM Service Provider
in-band, How the GRUU Is Used by Office Communications Server
information, Examining What Happens During Login Processing (Step 3), Examining What Happens During Login Processing (Step 3)
Proxy remote users, Director Role
Proxy Servers, Understanding How Office Communications Server Leverages Active Directory, Performing the Prep Forest Step
PSTN bridging to VoIP, Bridging VoIP to the PSTN Network by Using a Media Gateway, Publishing Web Interfaces to the Internet by Using HTTPS Reverse Proxy, Publishing Web Interfaces to the Internet by Using HTTPS Reverse Proxy
PTR (pointer) records, Understanding Subject Alternate Name
Public access, Understanding the Enhanced Presence Model, Overview of IM Conferencing Capabilities
Public Certificate Agency, Step 3: Plan Your Deployment Path
Public Certificate Authority (CA), Understanding Federation, Understanding TLS Certificates
Public IM connectivity (PIC), The Evolution of Office Communications Server 2007, Understanding the Enhanced Presence Model, Public IM Connectivity Scenario, Overview of the Public IM Connectivity Scenario, Considerations for Deploying the Public IM Connectivity Scenario, Enabling Federation with Public IM Service Providers, Provisioning Federation with a Public IM Service Provider, Configuring IM Service Providers, Considerations Involving Public IM Providers, Controlling Spim by Limiting Public Contacts, Controlling SPIM by Limiting Message Content, Enabling Users for Public IM Connectivity, Configuring Per-User and Global Settings, Examining the Technical Details Behind the Public IM Connectivity Scenario, Step 1: Specify Recipient's Account, Step 2: Recipient's Presence Displayed as Unknown, Step 3: Recipient's Account Added as a Contact, Step 4: Recipient's Presence Displayed as Offline, Step 7: Recipient's Presence Displayed as Online, Step 1: User Selects a Recipient from the Buddy List in Office Communicator, Step 2: User Types a Message to a Recipient, Step 4: Recipient Types a Reply to the User, Summary
capacity planning for, Capacity Planning Considerations
enabling users for, Enabling Users for Public IM Connectivity, Examining the Technical Details Behind the Public IM Connectivity Scenario, Configuring Per-User and Global Settings, Examining the Technical Details Behind the Public IM Connectivity Scenario
Configure Users Wizard for, Enabling Users for Public IM Connectivity, Configuring Per-User and Global Settings
settings for, Configuring Per-User and Global Settings
existing accounts on provider networks and, Considerations Involving Public IM Providers, Controlling Spim by Limiting Public Contacts, How the Provider Migrates Existing MSN Accounts, Controlling Spim by Limiting Public Contacts
federation with, Enabling Federation with Public IM Service Providers, Considerations Involving Public IM Providers, Provisioning Federation with a Public IM Service Provider, Configuring IM Service Providers, Considerations Involving Public IM Providers
configuring, Configuring IM Service Providers
provisioning, Provisioning Federation with a Public IM Service Provider
media sharing in, Considerations Involving Media Sharing
overview of, Public IM Connectivity Scenario, Enabling Federation with Public IM Service Providers, Overview of the Public IM Connectivity Scenario, Considerations for Deploying the Public IM Connectivity Scenario, Enabling Federation with Public IM Service Providers
public IM providers of, Considerations Involving Public IM Providers, Considerations Involving Existing Accounts on Provider Networks, Considerations Involving Existing Accounts on Provider Networks
security for, Security Considerations, Enabling Users for Public IM Connectivity, Controlling Spim by Limiting Public Contacts, Controlling SPIM by Limiting Message Content, Enabling Users for Public IM Connectivity
technical details of, Examining the Technical Details Behind the Public IM Connectivity Scenario, Step 5: User Receives a Message from the Recipient, Step 5: User Receives a Message from the Recipient
Public IM providers
enabling connections to, Considerations for Deploying the Public IM Connectivity Scenario, Provisioning Federation with a Public IM Service Provider
federation with, Understanding Federation, Understanding Federation with Public IM Providers
Public Switched Telephone Network (PSTN), The Evolution of Office Communications Server 2007, Telephony Conferencing Server
Mediation Server and, Mediation Server
VoIP bridging to, Bridging VoIP to the PSTN Network by Using a Media Gateway, Publishing Web Interfaces to the Internet by Using HTTPS Reverse Proxy, Publishing Web Interfaces to the Internet by Using HTTPS Reverse Proxy
VoIP versus, VoIP Scenarios
Publications, Understanding Categories of Presence Information

R

Real Time Audio (RT Audio) codecs, A/V Conferencing Server
Real-Time Communications (RTC) database, Examples of Resolving Common Office Communicator Problems
Real-Time Control Protocol (RTCP), Understanding Conferencing Servers and the Conferencing Server Factory
Real-Time Monitoring, Example of Gathering a Server Trace
Real-Time Protocol (RTP), A/V Edge Server, Understanding Conferencing Servers and the Conferencing Server Factory, Examining the Technical Details Behind VoIP Scenarios, Step 6: Plan for External User Access, Understanding Session Initiation Protocol
Real-Time Streaming Protocol (RTSP), Understanding Session Initiation Protocol
Record-Route headers, Examining What Happens During Session Establishment and Sending a Message (Post Step 2), Examining What Happens During Session Establishment and Sending a Message (Post Step 2)
Recurring conferences, Understanding Conference Expiration
Redundancy, Contoso's Deployment Path
REGISTER message, Common SIP Verbs, REGISTER, Route Signatures, Overview of NTLM and Kerberos, Examining Presence Components
Registrar service, Enterprise Edition Pool
Registration
authenticated, Examining What Happens After Sign-In Starts (Post Step 1), Examining What Happens After Sign-In Starts (Post Step 1)
initial, Examining What Happens After Sign-In Starts (Post Step 1)
Regular Expressions (regex)
in location normalization rules, Performing the Prep Forest Step
in phone normalization, Contoso's Deployment Path for Chicago
in phone route configuring, Configuring Voice Policies
in Remote Call Control, Starting Communicator 2007
Reliability of applications, Defining the Reliability Requirements
Remote access, Remote Access Scenarios, Understanding Basic Remote Access Topologies, Single Edge Server, Multisite Edge Topology, Understanding Basic Remote Access Scenarios, Examining the Basic Remote Access Scenario in Detail, Understanding Web Conferencing Remote Access, Examining the Web Conferencing Remote Access Scenario in Detail, Understanding Audio and Video Conferencing Remote Access, Understanding Extended Remote Access Scenarios, Enabling Office Communicator Web Access 2007, Examining a COMO Topology, Step 6: Plan for External User Access, Step 7: Plan for Deploying Load Balancers
authentication for, Understanding Conferencing User Types
configuration for, Overview of Office Communications Server 2007
Edge Server calculation for, Step 6: Plan for External User Access, Step 6: Plan for External User Access
Edge Server for, Step 6: Plan for External User Access
for Audio-Video conferencing, Examining the Web Conferencing Remote Access Scenario in Detail, Understanding Audio and Video Conferencing Remote Access, Understanding Audio and Video Conferencing Remote Access
for IM and presence, Understanding Basic Remote Access Scenarios, Examining the Basic Remote Access Scenario in Detail, Examining the Basic Remote Access Scenario in Detail
for Web conferencing, Understanding Web Conferencing Remote Access, Understanding Audio and Video Conferencing Remote Access, Use Office Communicator to Start a Conference (Step 1), Begin Sharing an Application (Step 3), Examining the Web Conferencing Remote Access Scenario in Detail, Understanding Audio and Video Conferencing Remote Access
in Live Communications Server 2003, The Evolution of Office Communications Server 2007
one-time Communicator configuration for, Examining What Happens After Sign-In Starts (Post Step 1)
security for, Security Features of Office Communications Server 2007
to corporate address book, Examining What Happens During Login Processing (Step 3)
topologies for, Understanding Basic Remote Access Topologies, Single-Site Edge Topology, Single Edge Server, Single-Site Edge Topology
Remote Call Control (RCC), The Evolution of Office Communications Server 2007, Understanding Remote Call Control Scenario, Overview of Remote Call Control Scenario, Technical Details Behind the Remote Call Control Scenario, Setting Up the Remote Call Control Scenario, Configuring a User for RCC, Configuring a Route on the Office Communications Server Pool for Server URI, Starting Communicator 2007, Summary
overview of, Overview of Remote Call Control Scenario, Technical Details Behind the Remote Call Control Scenario, Technical Details Behind the Remote Call Control Scenario
functionalities no longer provided, Overview of Remote Call Control Scenario
Unified Communications and, Overview of Remote Call Control Scenario
VoIP features, Overview of Remote Call Control Scenario
reasons for, Understanding Remote Call Control Scenario, Overview of Remote Call Control Scenario, Why Consider Remote Call Control?, Overview of Remote Call Control Scenario
setting up, Setting Up the Remote Call Control Scenario, Additional Resources, Configuring a User for RCC, Configuring a Route on the Office Communications Server Pool for Server URI, Starting Communicator 2007, Summary, Additional Resources
Communicator 2007 startup in, Starting Communicator 2007, Summary
CSTA gateway installation in, Installing the CSTA Gateway and Configuring the SIP/CSTA Interface on the PBX or IP PBX
Server URI route in, Configuring a User for RCC, Configuring a Route on the Office Communications Server Pool for Server URI
user configuration in, Setting Up the Remote Call Control Scenario, Configuring a User for RCC
technical details of, Technical Details Behind the Remote Call Control Scenario, Technical Details Behind the Remote Call Control Scenario
Remote Office Communicator 2007, Step 6: Plan for External User Access
Remove Pool Wizard, Step 8: Restore the Primary Site and Bring It Back Online
Repetition, Examining What Happens During Login Processing (Step 3)
Reports
of Deployment Validation Tools Server, Managing DVT by Using the Administrative Console
on Quality of Service metrics, Understanding GRUU Creation
Restricted policy, Contoso's Deployment Path for Chicago
Reverse number lookup (RNL), Overview of Remote Call Control Scenario
Roaming contacts, Examining What Happens During Login Processing (Step 3)
Roaming self, Examining What Happens During Login Processing (Step 3)
Rogue users, Understanding How Office Communications Server Leverages Active Directory, Configuring Trusted Server Settings
Role-based authorization, Understanding Conference Security and Access Types
RoundTable 2007 conferencing device, Overview of Office Communications Server Clients
Routing
by Session Initiation Protocol (SIP), Understanding SIP Routing, Route Signatures, Via Headers, Route Signatures
contact headers in, Contact Headers
federation logic in, Route Signatures
record-route headers in, Overview of SIP Routing Concepts
route headers in, Route Signatures
route logic in, Route Signatures
route signatures in, Route Signatures
via headers in, Via Headers
in normalization, Configuring Voice Policies, Configuring Phone Routes, Configuring Phone Routes
in Remote Call Control (RCC), Configuring a User for RCC, Configuring a Route on the Office Communications Server Pool for Server URI, Configuring a Route on the Office Communications Server Pool for Server URI
outbound VoIP calls, Examining the Technical Details Behind VoIP Scenarios, Understanding Phone Routes, Understanding Phone Routes
policies from, Contoso's Deployment Path for Chicago, Contoso's Deployment Path for Chicago
testing, Contoso's Deployment Path for Chicago, Contoso's Deployment Path for Chicago
rspauth parameter, Overview of NTLM and Kerberos
RTAudio, Understanding Audio and Video Conferencing
RTC Aggregate application, Examining the RTChost.exe Process, Examining Conferencing Components, Examining Presence Components, Examining Conferencing Components
RTC database, Understanding the Conferencing Database
RTCDyn database, Understanding the Conferencing Database, Understanding Conference Deactivation
RTChost.exe process, Examining the RTChost.exe Process
RTCPropertySet property set, Performing the Prep Forest Step
RTCServices SCP, Understanding How Office Communications Server Leverages Active Directory
RTCsrv.exe process, Examining the RTCsrv.exe Process, Examining the RTChost.exe Process, Examining the RTChost.exe Process
RTCUniversalGlobalWriteGroup, Understanding How Office Communications Server Leverages Active Directory, Performing the Prep Forest Step, Configuring Global Enterprise Voice Settings
RTCUniversalGuestAccessGroup, Performing the Prep Forest Step
RTCUniversalReadOnlyAdmins, Backing Up Pool and Global Settings
RTCUniversalUserReadOnlyGroup, Performing the Prep Forest Step
RTVideo, Understanding Audio and Video Conferencing

S

Safari browser, Overview of Office Communications Server Clients, Communicator Web Access
Scaled Single-Site Edge Server, Comparing Consolidated Topology to Expanded Topology
Scheduling client, Understanding Conferencing Clients, Understanding Conference Creation
Schema Administrator group, Performing the Prep Schema Step
Scientific mode, Examples of Problem Events and Troubleshooting Steps
Screen names, Considerations Involving Existing Accounts on Provider Networks
Secure Real-Time Protocol (SRTP), Understanding Edge Servers, Understanding Audio and Video Conferencing Remote Access, Overview of Remote Call Control Scenario, Step 6: Plan for External User Access
Secure Sockets Layer (SSL), Understanding TLS Certificates
Security identifiers (SIDs), Restoring Domain Information
Security Support Provider Interface (SSPI), Overview of NTLM and Kerberos
Security.
access rights management for, Managing Access Rights, TLS and MTLS for Client and Server Message Integrity, TLS and MTLS for Client and Server Message Integrity
attack types against, Enabling NTLM v2, Remote User Access, Security Features of Office Communications Server 2007, Remote User Access
authorization, Understanding Federation with Public IM Providers
federation domain validation for, Federation Domain Validation
for public IM connectivity (PIC), How the Provider Migrates Existing MSN Accounts, Enabling Users for Public IM Connectivity, Controlling Spim by Limiting Public Contacts, Enabling Users for Public IM Connectivity
for URL and file transfers, Managing Access Rights
in Audio-Video Edge Server deployments, Step 6: Plan for External User Access, Step 7: Plan for Deploying Load Balancers, Step 7: Plan for Deploying Load Balancers
in conferencing, Understanding the Closed Authenticated Conference, Understanding Web Conferencing Content Tools
in remote user access, Security Features of Office Communications Server 2007
TLS and MTLS for, TLS and MTLS for Client and Server Message Integrity, Additional Resources, Additional Resources
Self, Examining What Happens During Login Processing (Step 3)
Server roles, Server Roles, On the Companion CD, Standard Edition Server, Enterprise Edition Pool, Director Role, Conferencing Servers, IM Conferencing Server, Telephony Conferencing Server, Edge Servers, Access Edge Server, Web Conferencing Edge Server, A/V Edge Server, Communicator Web Access, Web Components Server, Supported Collocation Server Roles, Summary, On the Companion CD
archiving and CDR, Archiving and CDR Server, Edge Servers, Edge Servers
Communicator Web Access, Communicator Web Access, Web Components Server
Conferencing, Conferencing Servers, Archiving and CDR Server, IM Conferencing Server, Telephony Conferencing Server, Archiving and CDR Server
Director, Enterprise Edition Pool, Conferencing Servers, Director Role, Conferencing Servers
Edge, Edge Servers, A/V Edge Server, Access Edge Server, Web Conferencing Edge Server, A/V Edge Server
Access, Access Edge Server
Web Conferencing, Web Conferencing Edge Server
in deployment planning, Step 1: Determining Key Planning Decisions, Step 8: Plan for VoIP
in Enterprise Edition pool, Standard Edition Server, Director Role, Enterprise Edition Pool, Director Role
in consolidated configuration, Enterprise Edition Pool
in expanded configuration, Enterprise Edition Pool
in Standard Edition, Server Roles, Standard Edition Server, Standard Edition Server
forking and, Standard Edition Server
hardware and software requirements for, Enterprise Edition Pool
home server in, Standard Edition Server
Mediation, Mediation Server, Supported Collocation Server Roles, Supported Collocation Server Roles
overview of, Overview of Office Communications Server 2007
supported collocation, Supported Collocation Server Roles, Summary, Summary
Web Components, Web Components Server
Servers
backup and restore for
for database recovery, Preparing to Use the Hardware and Software of an Existing Server for Database Recovery
of settings, Backing Up Pool and Global Settings
events of, Understanding Server Events, Configuring Trace Settings, Examples of Normal Events, Examples of Problem Events and Troubleshooting Steps, Configuring Trace Settings
in conferencing architecture, Understanding the Focus Factory, Understanding Conferencing Servers and the Conferencing Server Factory, Understanding Conferencing Servers and the Conferencing Server Factory
restoration sequence for, Deciding How to Restore Service
setup logs of, Using Server Setup Logs
trusted, Understanding How Office Communications Server Leverages Active Directory, Configuring Trusted Server Settings
Service connection point (SCP) settings, Configuring Service Connection Point Settings, Configuring Trusted Server Settings, Configuring Trusted Server Settings
Service connection points (SCPs), Understanding How Office Communications Server Leverages Active Directory
Service Level Agreements (SLAs), Step 8: Restore the Primary Site and Bring It Back Online
Service licenses
in public IM connectivity, Overview of the Public IM Connectivity Scenario
SERVICE message, SERVICE, Route Signatures
Service principal name (SPN), Understanding How Office Communications Server Leverages Active Directory, Examining What Happens After Sign-In Starts (Post Step 1), Overview of NTLM and Kerberos
Service Record Locator (SRV), Understanding Federated Partner Discovery, Considerations for Deploying the Public IM Connectivity Scenario
Service start failures, Examples of Resolving Common Management and Configuration Problems, Examples of Resolving Common Management and Configuration Problems
Services, Performing the Prep Forest Step
Services Subscription license (SSL), Provisioning Federation with a Public IM Service Provider
Session Description Protocol (SDP), Migrating Users from Live Communications Server 2005 SP1 to Office Communications Server 2007, Understanding Session Initiation Protocol
Session Initiation Protocol (SIP), Microsoft Unified Communications AJAX SDK, Understanding Session Initiation Protocol, Common SIP Verbs, INVITE and MESSAGES, ACK, Record-Route Headers
Access Edge Server and, Understanding Edge Servers, Remote Access Scenarios
as signaling protocol, Understanding the Conferencing Protocols
authenticated enterprise user and, Understanding Conferencing User Types
DNS routing in, Using DNS to Publish Office Communications Server, Using DNS to Publish Office Communications Server
Exchange Server 2007 Unified Messaging and, Examining the Technical Details Behind VoIP Scenarios
federation and, Understanding Direct Federation
Focus and, Understanding Focus, Understanding Conference Activation
front-end server and, Enterprise Edition Pool
functions of, Understanding Session Initiation Protocol, Understanding Session Initiation Protocol
home server and, Server Roles
in Instant Messaging, Examining What Happens During Session Establishment and Sending a Message (Post Step 2)
in login sign-in process, Examining What Happens After Sign-In Starts (Post Step 1)
in prep forest step, Performing the Prep Schema Step, Performing the Prep Forest Step, Performing the Prep Forest Step
in presence scenarios, Step 5: Controlling the Access Level of a Contact
in restoring domain information, Restoring Domain Information
Mediation Server translation of, Bridging VoIP to the PSTN Network by Using a Media Gateway
migrating to namespaces of, Using DNS to Publish Office Communications Server
responses of, Common SIP Responses, Overview of SIP Routing Concepts, Understanding SIP Routing, Overview of SIP Routing Concepts
routing by, Understanding SIP Routing, Route Signatures, Route Signatures
SAN field and, Configuring the Subject Alternative Name
signaling protocol, Understanding the Conferencing Protocols, Understanding the Conferencing Protocols
trusted server entries and, Understanding How Office Communications Server Leverages Active Directory
verbs of, Common SIP Verbs, Informational, REGISTER, SUBSCRIBE and NOTIFY Requests, SERVICE, INVITE and MESSAGES, Informational
ACK, ACK
BYE, BYE
CANCEL, CANCEL
INVITE, INVITE and MESSAGES, CANCEL
MESSAGES, INVITE and MESSAGES
NOTIFY, SUBSCRIBE and NOTIFY Requests
REGISTER, Common SIP Verbs, REGISTER
SERVICE, SERVICE
SUBSCRIBE, SUBSCRIBE and NOTIFY Requests
WMI classes for, Configuring Global Settings, Configuring UC-specific Settings, Configuring UC-specific Settings
Session Initiation Protocol for Instant Messaging and Presence Leveraging Extensions (SIMPLE), Understanding the Conferencing Protocols
Session Initiation Protocol-Computer Supported Telephony Applications (SIP-CSTA) gateway, Overview of Remote Call Control Scenario, Technical Details Behind the Remote Call Control Scenario
Session Initiation Protocol-Public Switched Telephone Network (SIP-PSTN) gateways, Understanding Contoso's User Distribution
Session keys, Understanding TLS Certificates, Comparing Consolidated Topology to Expanded Topology, Comparing Consolidated Topology to Expanded Topology
setContact request, Examining What Happens When Adding a Contact (Step 2)
Setup failures, Examples of Resolving Common Management and Configuration Problems
Share Information Using Live Meeting option, Understanding Conference Creation, Use Office Communicator to Start a Conference (Step 1)
Sharing, Understanding Data Collaboration, Understanding Conferencing Clients, Understanding Meeting Policy and Policy Enforcement
Sign-in, Troubleshooting Sign-in Problems
Signaling protocols, Understanding the Conferencing Protocols, Understanding the Client Conference Joining Sequence, Configuring the Mediation Server
Simple Mail Transfer Protocol (SMTP), Using DNS to Publish Office Communications Server
Simple Traversal of User Datagram Protocol, Single-Site Edge Topology, Step 6: Plan for External User Access
Simple Traversal Underneath NAT (STUN) protocol, Understanding Edge Servers, Understanding Audio and Video Conferencing Remote Access
Single sign-in experience, Understanding How Office Communications Server Leverages Active Directory
Single-instance failover, Scaling with SQL Server
Single-point-of-failure situations, Defining the Reliability Requirements
Single-step call transfer, Overview of Remote Call Control Scenario
SIP proxy, Examining the RTCsrv.exe Process
SIP stack, Examples of Normal Events, Example of Gathering a Server Trace, Examining the RTCsrv.exe Process
SIPParser tool, Overview of Diagnostic Tools
Sites
primary, Step 8: Restore the Primary Site and Bring It Back Online, Step 8: Restore the Primary Site and Bring It Back Online
primary site to support secondary site in, Step 4: Prepare the Primary Site to Support Recovery at the Secondary Site
secondary site brought online for, Step 5: Maintain the Secondary Site, Step 8: Restore the Primary Site and Bring It Back Online, Step 7: Bring the Secondary Site Online, Step 8: Restore the Primary Site and Bring It Back Online
secondary site deployment for, Step 1: Determine the Recovery Support to Be Provided by the Secondary Site
secondary site maintenance for, Step 3: Set Up the Secondary Site, Step 7: Bring the Secondary Site Online, Step 5: Maintain the Secondary Site, Step 7: Bring the Secondary Site Online
secondary site set up for, Step 3: Set Up the Secondary Site
secondary site support for, Restoring Sites, Step 2: Create a Deployment Plan and Restoration Strategy for the Secondary Site, Step 1: Determine the Recovery Support to Be Provided by the Secondary Site, Step 2: Create a Deployment Plan and Restoration Strategy for the Secondary Site
simulation of, Step 5: Maintain the Secondary Site
Slide files folder, Understanding Web Conferencing Server Content Management
Snapshot slides, Understanding Data Collaboration
Sniffing and snooping attacks, Security Features of Office Communications Server 2007
Snooper tool, Overview of Diagnostic Tools, Looking at Trace Files, Understanding Office Communications Server Traces, Example of Gathering a Server Trace, Using Snooper, Resolving Common Problem Scenarios, Examples of Resolving Common Office Communicator Problems
snum parameter, Overview of NTLM and Kerberos
SOAP envelope, SERVICE
Softphones, Examining the Technical Details Behind VoIP Scenarios
SPIM (SPAM over IM)
message content control and, Controlling SPIM by Limiting Message Content, Enabling Users for Public IM Connectivity, Enabling Users for Public IM Connectivity
public contact control and, Controlling Spim by Limiting Public Contacts, Controlling SPIM by Limiting Message Content, Controlling SPIM by Limiting Message Content
security for, Enabling NTLM v2
SPL Access Layer, Examining Presence Components
Spoofing attacks, Security Features of Office Communications Server 2007, TLS and MTLS for Client and Server Message Integrity
SQL Management Studio, Examples of Resolving Common Office Communicator Problems
SQL Server, Overview of Office Communications Server 2007
cluster, Enterprise Edition Pool, Scaling with SQL Server, Preparing DNS, Firewall Ports, and Certificates for Chicago Deployment, Preparing DNS, Firewall Ports, and Certificates for Chicago Deployment
database separated from, Standard Edition Server
scaling of, Scaling with SQL Server, Building Redundancy with Hardware Load Balancing, Building Redundancy with Hardware Load Balancing
SQL Server Management Studio, Backup and Restore Requirements, Preparing to Use the Hardware and Software of an Existing Server for Database Recovery, Installing Restoration Tools, Restoring Databases
srand parameter, Overview of NTLM and Kerberos
SRVLookup tool, Overview of Diagnostic Tools
Standby servers, Building Standby Servers, Restoring Sites
Static IP address, Building Redundancy with Hardware Load Balancing, Monitoring Overall Status by Using the Status Pane, Examples of Problem Events and Troubleshooting Steps
Status pane, Monitoring Office Communications Server by Using the Admins Tools, Monitoring Overall Status by Using the Status Pane
Storage, Step 9: Plan for Address Book Server
Subject Alternative Name (SAN)
for Access Edge Server, Configuring the Common Name or Subject Name, Configuring the Subject Alternative Name, Configuring the Subject Alternative Name
in federation, Understanding the Requirements for and Use of Certificates in Federation, Understanding TLS Certificates, Understanding Subject Alternate Name, Understanding TLS Certificates
in remote access, Enabling Office Communicator Web Access 2007
Subject Name (SN), Configuring the Common Name or Subject Name, Enabling Office Communicator Web Access 2007
SUBSCRIBE message, SUBSCRIBE and NOTIFY Requests, Route Signatures, Examining Presence Components
Subscriber Access, Step 8: Plan for VoIP
Subscriptions
for public IM connectivity (PIC), Provisioning Federation with a Public IM Service Provider, Configuring IM Service Providers, Configuring IM Service Providers
home server storage of, Standard Edition Server
in federation, Step 2—BENOTIFY and OK/200
in login process, Examining What Happens After Sign-In Starts (Post Step 1), Examining What Happens During Login Processing (Step 3)
to conferences, Understanding the Client Conference Joining Sequence, Examining the Web Conferencing Remote Access Scenario in Detail
to presence, Examining What Happens When Adding a Contact (Step 2), Examining What Happens When Subscribing for Presence and Receiving an Offline Notification (Step 3), Examining What Happens When Subscribing for Presence and Receiving an Offline Notification (Step 3)
Supported collocation server roles, Supported Collocation Server Roles, Summary, Summary
Symmetric encryption key, Examining What Happens After Sign-In Starts (Post Step 1)
Symmetric key cryptography, Understanding TLS Certificates
System container, Understanding How Office Communications Server Leverages Active Directory, Understanding How Office Communications Server Leverages Active Directory

T

targetname parameter, Overview of NTLM and Kerberos
Tasks, Using Tasks, Monitoring Office Communications Server Usage by Using Call Detail Records
Team access, Understanding the Enhanced Presence Model
TechNet, Understanding How Office Communications Server Leverages Active Directory, Examining What Happens After Sign-In Starts (Post Step 1)
Telephony Conferencing Server, Conferencing Servers, Telephony Conferencing Server, Understanding Conferencing Servers and the Conferencing Server Factory, Understanding the Conferencing Protocols
Test Connection button, Resolving Common Problem Scenarios
Testing certificates, Examining What Happens After Sign-In Starts (Post Step 1), Examining What Happens After Sign-In Starts (Post Step 1)
Text chat, Understanding Conferencing Clients
Text slides, Understanding Data Collaboration
Thawte public certificate authority, Understanding TLS Certificates
Third-party SIP servers, Understanding How Office Communications Server Leverages Active Directory
Time Division Multiplexing (TDM) PBX, Why Consider Remote Call Control?, Understanding Contoso's Telephone Infrastructure, Step 8: Plan for VoIP
Time-to-live (TTL) interval, Overview of NTLM and Kerberos
TLS Handshake Protocol, Overview of TLS
TLS Record Protocol, Overview of TLS
Tools, Examples of Resolving Common Management and Configuration Problems
Topology Designer, Overview of Diagnostic Tools
Total cost of ownership (TCO), Configuring the Mediation Server
Trace logs, Using Client and Server Trace Logs, Additional Resources, Looking at Trace Files, Understanding Office Communications Server Traces, Example of Gathering a Server Trace, Using Snooper, Additional Resources
in troubleshooting, Examples of Resolving Common Office Communicator Problems, Examples of Resolving Common Conferencing Problems
overview of, Examples of Problem Events and Troubleshooting Steps, Understanding Office Communications Server Traces, Configuring Trace Settings, Looking at Trace Files, Understanding Office Communications Server Traces
server, Understanding Office Communications Server Traces, Additional Resources, Example of Gathering a Server Trace, Using Snooper, Additional Resources
Translation service, Understanding the Translation Service
Transmission Control Protocol (TCP), Bridging VoIP to the PSTN Network by Using a Media Gateway
in public IM connectivity, Considerations for Deploying the Public IM Connectivity Scenario
in remote access, Examining the Basic Remote Access Scenario in Detail
ports for, Step 6: Plan for External User Access
Transport Layer Security (TLS) over, Examining What Happens After Sign-In Starts (Post Step 1)
Transmission Control Protocol-Internet Protocol (TCP-IP) stack, Understanding Session Initiation Protocol
Transport Layer Security (TLS)
certificates of, Understanding TLS Certificates, Comparing Consolidated Topology to Expanded Topology, Comparing Consolidated Topology to Expanded Topology
for authentication, Overview of TLS, Example of a TLS Handshake over the Network
for message integrity, Managing Access Rights, Additional Resources, Summary, Additional Resources
in basic remote access, Examining the Basic Remote Access Scenario in Detail
in single Edge Server topology, Understanding Basic Remote Access Topologies
Transmission Control Protocol and, Examining What Happens After Sign-In Starts (Post Step 1)
Trascode RTP media traffic, Configuring the Mediation Server
Traversal Using Relay NAT (TURN) protocol, Understanding Edge Servers, Understanding Audio and Video Conferencing Remote Access
Trojan horse attacks, Security Features of Office Communications Server 2007
Troubleshooting, Troubleshooting Problem Scenarios, On the Companion CD, Overview of the Troubleshooting Process, Summary of Troubleshooting Steps, Resolving Common Problem Scenarios, Resolving Local and Remote Login Problems and Basic Operational Problems, Examples of Resolving Common Office Communicator Problems, Resolving Conferencing Problems Involving Sharing Files and A/V, On the Companion CD
Audio-Video and file sharing in conferencing, Resolving Conferencing Problems Involving Sharing Files and A/V, Examples of Resolving Common Conferencing Problems, Resolving Management and Configuration Problems, Examples of Resolving Common Management and Configuration Problems
content downloading, Resolving Conferencing Problems Involving Sharing Files and A/V, Examples of Resolving Common Conferencing Problems
session description protocol information for, Resolving Conferencing Problems Involving Sharing Files and A/V
client connections, Examining What Happens After Sign-In Starts (Post Step 1), Examining What Happens After Sign-In Starts (Post Step 1)
Edge Server connection failures, Resolving Common Problem Scenarios, Resolving Local and Remote Login Problems and Basic Operational Problems, Resolving Local and Remote Login Problems and Basic Operational Problems
Live Meeting join failure, Resolving Common Problem Scenarios, Resolving Common Problem Scenarios
local and remote login problems, Resolving Local and Remote Login Problems and Basic Operational Problems, Examples of Resolving Common Communicator Web Access Problems, Examples of Resolving Common Office Communicator Problems, Examples of Resolving Common Communicator Web Access Problems
primary root causes in, Resolving Common Problem Scenarios, Resolving Common Problem Scenarios
problem events, Examples of Problem Events and Troubleshooting Steps, Examples of Normal Events, Examples of Problem Events and Troubleshooting Steps
problem spaces by technical area for, Identifying Primary Problem Spaces by Technical Area, Summary of Troubleshooting Steps, Summary of Troubleshooting Steps
remote access, Understanding Audio and Video Conferencing Remote Access, Understanding Audio and Video Conferencing Remote Access
sign-in, Troubleshooting Sign-in Problems, Security Features of Office Communications Server 2007, Security Features of Office Communications Server 2007
status pane display for, Monitoring Overall Status by Using the Status Pane
steps in, Summary of Troubleshooting Steps, Resolving Common Problem Scenarios, Resolving Common Problem Scenarios
telephony problems, Resolving Telephony Problems, Additional Resources, Examples of Resolving Common Telephony Problems, Summary, Additional Resources
in conference calls, Examples of Resolving Common Telephony Problems
in exporting dial plans, Resolving Telephony Problems
in login, Resolving Telephony Problems, Examples of Resolving Common Telephony Problems
in placing calls, Examples of Resolving Common Telephony Problems
in voice mail, Examples of Resolving Common Telephony Problems
unexpected behavior in, Examples of Resolving Common Telephony Problems
Trust element of federated partners, Understanding Direct Federation
Trusted multipoint control unit (MCU) factories, Performing the Prep Forest Step
Trusted proxy servers, Performing the Prep Forest Step
Trusted Root Certification Authorities, Examples of Resolving Common Office Communicator Problems
Trusted servers, Understanding How Office Communications Server Leverages Active Directory, Configuring Trusted Server Settings
Trusted services, Performing the Prep Forest Step
Trusted Web Components Server, Performing the Prep Forest Step
Two-factor authentication, Communicator Web Access
Two-party calling, Using Two-Party Calling, Configuring Call Deflection, Configuring Call Deflection

U

U.S. Congress, Why Talk About the Public IM Connectivity Scenario?
Unified Communications (UC)
Client Platform (UCCP) logs for, Resolving Common Problem Scenarios
planning for, Step 8: Plan for VoIP
Voice over IP (VoIP) and, Configuring Users for Unified Communications
Unified Communications (UC) AJAX software development kit (SDK), Microsoft Unified Communications AJAX SDK, Communicator Web Access
Unified Communications (UC) software development kit (SDK), The Evolution of Office Communications Server 2007
Unified Communications Product Group, Step 5: Review System and Network Requirements
Unified Messaging (UM)
Voice over IP (VoIP) and, Examining the Technical Details Behind VoIP Scenarios
Uniform Resource Identifier (URI), Examining What Happens When Adding a Contact (Step 2), Understanding Authenticated Enterprise Users
Uninstallation, Examples of Resolving Common Management and Configuration Problems
Universal Naming Convention (UNC), Understanding Web Conferencing Server Content Management
Universal Plug and Play (UPnP) Network Address Translation (NAT) device, Troubleshooting Sign-in Problems
Universal security groups, Performing the Prep Forest Step, Understanding Multiparty Instant Messaging
URL filtering, Controlling SPIM by Limiting Message Content
USB phones, Using Two-Party Calling
User Accounts
for federation, Configuring User Accounts for Federation, Managing Multiple User Accounts
User Agent Server (UAS), How Office Communications Server 2007 and Office Communicator 2007 Use SIP
User Datagram Protocol (UDP), A/V Edge Server, Examining What Happens When Sharing Video (Step 6), Security Considerations, Examining the Technical Details Behind VoIP Scenarios
User replicator (UR), Standard Edition Server, Examining the RTCsrv.exe Process
User Services module (US), Examining the RTCsrv.exe Process, Examining Presence Components
User Subscription license (USL), Provisioning Federation with a Public IM Service Provider
UserInfo section, Examining What Happens During Login Processing (Step 3)

V

Validation, Examining What Happens After Sign-In Starts (Post Step 1)
Validation Wizard
as diagnostic tool, Diagnostic Tools and Resources
for troubleshooting, Summary of Troubleshooting Steps, Resolving Common Problem Scenarios, Examples of Resolving Common Office Communicator Problems, Examples of Resolving Common Conferencing Problems, Resolving Management and Configuration Problems
VeriSign public certificate authority, Understanding TLS Certificates
Video sharing, Examining What Happens When Sharing Video (Step 6)
Virtual IP (VIP) of hardware load balancers (HLB), Enterprise Edition Pool, Using DNS to Publish Office Communications Server, Building Redundancy with Hardware Load Balancing
Virtual private network (VPN), Step 1: Determining Key Planning Decisions
Virus attacks, Security Features of Office Communications Server 2007
Visio 2007, Understanding Subject Alternate Name
Voice mail, Using Voice Mail, Using Ad Hoc Conference Calling, Defining the Scenario Selection, Examples of Resolving Common Telephony Problems, How the GRUU Is Used by Office Communications Server
Voice over IP (VoIP), Overview of Office Communications Server 2007, What Is VoIP?, Using Two-Party Calling, Configuring Call Forwarding, Using Voice Mail, Examining the Technical Details Behind VoIP Scenarios, Understanding Voice Policies, Understanding Phone Usage, Understanding How Inbound Calls Are Routed, Understanding Normalization, Configuring Global Enterprise Voice Settings, Configuring Voice Policies, Configuring Phone Routes, Configuring Location Profiles, Configuring VoIP, Configuring Users for Unified Communications, Configuring the Mediation Server, Configuring the Deployment Validation Tool Server, Configuring the DVT Agent, Managing DVT by Using the Administrative Console
ad hoc conference calling with, Using Ad Hoc Conference Calling, Using Ad Hoc Conference Calling
applications in, Examining the RTChost.exe Process
call deflection with, Configuring Call Deflection, Configuring Call Forwarding, Configuring Call Forwarding
call forwarding with, Configuring Call Forwarding
components for, Understanding the Translation Service
configuring, Configuring VoIP, Summary, Configuring Users for Unified Communications, Configuring the Media Gateway, Configuring the Mediation Server, Configuring the QoE Monitoring Server, Configuring the Deployment Validation Tool Server, Configuring the DVT Organizer, Configuring the DVT Agent, Summary
Deployment Validation Tool Server in, Configuring the Deployment Validation Tool Server, Configuring the DVT Organizer, Managing DVT by Using the Administrative Console
for Unified Communications, Configuring Users for Unified Communications, Configuring the Media Gateway
Mediation Server in, Configuring the Mediation Server
Quality of Experience Monitoring Server in, Configuring the QoE Monitoring Server
description of, VoIP Scenarios, What Is VoIP?, What Is VoIP?
in Office Communicator Web Access 2007, Enabling Office Communicator Web Access 2007
normalized settings for, Understanding How Office Communications Server Leverages Active Directory
planning for, Step 8: Plan for VoIP
technical details of, Examining the Technical Details Behind VoIP Scenarios, Configuring Global Enterprise Voice Settings
normalization in, Understanding Normalization, Configuring Phone Routes, Configuring Location Profiles, Configuring VoIP
outbound call routing in, Understanding How Outbound Calls Are Routed
topology elements in, Examining the Technical Details Behind VoIP Scenarios, Understanding How Outbound Calls Are Routed
two-party calling with, Using Two-Party Calling, Configuring Call Deflection, Configuring Call Deflection
Unified Communication settings for, Configuring Policy-Specific Settings
voice mail with, Using Voice Mail, Using Ad Hoc Conference Calling, Using Ad Hoc Conference Calling

W

Watchers, Standard Edition Server
Web Components, Overview of Office Communications Server 2007
in conferencing architecture, Understanding Conferencing Servers and the Conferencing Server Factory
trusted, Understanding How Office Communications Server Leverages Active Directory, Performing the Prep Forest Step
Web Conferencing, Understanding Conference Expiration, Understanding Meeting Policy and Policy Enforcement, Understanding the Client Conference Joining Sequence, Understanding the Client Join Sequence to the Web Conferencing Server, Understanding Conference Control, Understanding Web Conferencing Server Content Management, Understanding Web Conferencing Server Content Upload and Download, Understanding Meeting Compliance, Understanding Web Conferencing Content Tools, Understanding Meeting Policy and Policy Enforcement, Summary
Access Edge Server for, Understanding Edge Servers
client joining sequence in, Examining the Technical Details Behind Web Conferencing, Understanding the Client Conference Joining Sequence, Understanding the Client Conference Joining Sequence
client joining sequence to server for, Understanding the Client Join Sequence to the Web Conferencing Server, Understanding Conference Control, Understanding Conference Control
content management in, Understanding Web Conferencing Server Content Management, Understanding Web Conferencing Server Content Management
content tools for, Understanding Web Conferencing Content Tools
content uploading and downloading in, Understanding Web Conferencing Server Content Upload and Download, Understanding Meeting Compliance, Understanding Meeting Compliance
control of, Understanding Conference Control, Understanding Conference Control
Edge Server for, Access Edge Server, Web Conferencing Edge Server
meeting compliance in, Understanding Meeting Compliance, Understanding Meeting Compliance
meeting policy for, Understanding Meeting Policy and Policy Enforcement, Understanding Meeting Policy and Policy Enforcement
remote access for, Understanding Web Conferencing Remote Access, Examining the Web Conferencing Remote Access Scenario in Detail
server deployment example for, Preparing DNS, Firewall Ports, and Certificates for Chicago Deployment, Preparing DNS, Firewall Ports, and Certificates for Chicago Deployment
server for, A/V Conferencing Server, Understanding Web Conferencing Server Content Upload and Download
Web content, Preparing DNS, Firewall Ports, and Certificates for Chicago Deployment, Preparing DNS, Firewall Ports, and Certificates for Chicago Deployment
Web interfaces, Publishing Web Interfaces to the Internet by Using HTTPS Reverse Proxy, Publishing Web Interfaces to the Internet by Using HTTPS Reverse Proxy
Web proxy, Examples of Resolving Common Conferencing Problems, Examples of Resolving Common Conferencing Problems
Web Scheduler Resource Kit tool, Understanding Web Components, Understanding Conference Creation
Web service group expansion, Understanding Multiparty Instant Messaging, Understanding Audio and Video Conferencing Remote Access, Understanding Data Collaboration, Understanding Audio Conferencing Provider Support, Understanding the Conferencing Architecture, Understanding Conferencing Clients, Understanding Focus, Understanding Conferencing Servers and the Conferencing Server Factory, Understanding Process and Machine Boundaries for Conferencing Components, Understanding Edge Servers, Understanding the Conferencing Protocols, Understanding the Conference Life Cycle, Understanding Conference Creation, Understanding Conference Expiration, Understanding the Client Conference Joining Sequence, Understanding the Client Join Sequence to the Web Conferencing Server, Understanding Web Conferencing Server Content Management, Understanding Web Conferencing Server Content Upload and Download, Understanding Meeting Compliance, Understanding Web Conferencing Content Tools, Understanding Meeting Policy and Policy Enforcement, Remote Access Scenarios, Single Edge Server, Single-Site Edge Topology, Multisite Edge Topology, Understanding Web Conferencing Remote Access, Use Office Communicator to Start a Conference (Step 1), Examining the Web Conferencing Remote Access Scenario in Detail, Understanding Audio and Video Conferencing Remote Access
Web slides, Understanding Data Collaboration
Whiteboard, Overview of Web Conferencing Capabilities, Understanding Data Collaboration, Understanding Conferencing Clients, INVITE and MESSAGES
Wide area network (WAN), Step 8: Plan for VoIP
Windows Components Wizard, Configuring the QoE Monitoring Server
Windows Firewall Internet Connection Sharing service, Configuring the DVT Organizer, Configuring the DVT Agent, Configuring the DVT Agent
Windows Management Instrumentation (WMI)
consumers of, Examining the RTCsrv.exe Process
policy-specific settings configuration and, Configuring Policy-Specific Settings, Configuring Service Connection Point Settings, Configuring Service Connection Point Settings
pool settings and, Configuring Pool Settings, Configuring Server Settings, Configuring Server Settings
prep domain and prep forest step and, Using DNS to Publish Office Communications Server
server connection point settings and, Configuring Service Connection Point Settings
server settings and, Configuring Edge Server Settings
trusted server settings and, Configuring Trusted Server Settings
Unified Communications settings configuration and, Configuring UC-specific Settings, Configuring Policy-Specific Settings, Configuring Policy-Specific Settings
user-specific settings and, Configuring User-Specific Settings
Windows Messenger, Overview of Office Communications Server Clients
Windows Mobile devices, Overview of Office Communications Server Clients
Windows Server 2003 Resource Kit Tools, Examining What Happens During the Initial Launch of Communicator 2007 (Pre-Step 1)
Windows Software Trace Pre-processor (WPP), Using Client and Server Trace Logs
Winerror.exe, Examining What Happens During the Initial Launch of Communicator 2007 (Pre-Step 1)
Winsock error code, Examples of Resolving Common Office Communicator Problems
Wireshark tool, Overview of Diagnostic Tools
WMI Common Information Model (CIM) tool, Configuring Pool Settings
Worm attacks, Security Features of Office Communications Server 2007
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset