You are previewing Microsoft® Office Communications Server 2007 R2 Resource Kit.
O'Reilly logo
Microsoft® Office Communications Server 2007 R2 Resource Kit

Book Description

In-depth, comprehensive, and fully revised for R2 this RESOURCE KIT delivers the information you need to deploy, manage, and troubleshoot Microsoft Office Communications Server 2007 R2. Get technical insights, scenarios, and best practices from those who know the technology best the engineers who designed and developed it along with 90+ Windows PowerShell scripts, bonus references, and other essential resources on CD. Get expert advice on how to: Plan server roles, infrastructure, topology, and security Design and manage enterprise instant messaging (IM), presence, and conferencing solutions Configure voice mail, enterprise voice, dual-forking (PBX), and VoIP Apply industry best practices for deployment Manage Unified Communications clients and devices Administer remote access, federation, and public IM Understand SIP and authentication technologies Implement a cross-team backup-and-restore plan Automate management tasks sample scripts included Monitor, diagnose, and troubleshoot problems more efficiently CD features: 90+ Windows PowerShell scripts for automating administrative tasks Office Communication Server Resource Kit tools Links to references and webcasts Understanding Microsoft Virtualization Solutions eBook Four appendixes, including Windows PowerShell functions, Direct SIP with IP-PBX, and A/V troubleshooting Bonus content Chapters from 15 related Microsoft Press books Fully searchable eBook of this guide.

Table of Contents

  1. Microsoft® Office Communications Server 2007 R2 Resource Kit
    1. SPECIAL OFFER: Upgrade this ebook with O’Reilly
    2. A Note Regarding Supplemental Files
    3. Foreword
    4. Acknowledgments
      1. Personal Acknowledgements
    5. Introduction
      1. Overview of the Book
      2. Document Conventions
        1. Reader Aids
        2. Sidebars
        3. Command-line Examples
      3. Companion CD
      4. Find Additional Content Online
        1. Resource Kit Support Policy
    6. I. Overview and Architecture
      1. 1. Overview of Office Communications Server 2007 R2
        1. Office Communications Server Editions and Components
        2. The Evolution of Office Communications Server 2007 R2
        3. Customizing the Platform
        4. Summary
        5. Additional Resources
      2. 2. New Features Overview
        1. New Features
          1. Call Delegation
          2. Team Ring
          3. Group Chat
          4. Desktop Sharing
          5. Desktop Sharing Requirements
          6. Desktop Sharing Features
          7. Audio Conferencing
          8. Server Applications
            1. Dial-in Conferencing Feature
            2. Conferencing Attendant
            3. Conferencing Announcement Service
            4. Response Group Service
          9. Sample Scenarios
          10. Outside Voice Control
          11. SIP Trunking
          12. Enhanced Media
          13. Simplified Firewall Configuration for the A/V Edge Server
          14. Presence Enhancements
          15. Archiving, CDR, and QoE Enhancements
          16. Simplified Management
            1. Simplified Topologies
            2. Enhanced Administrative Snap-In
            3. Conference Directories
            4. Automatic Updates
            5. Improved Certificate Wizard
            6. In-Band Provisioning Enhancements
            7. Optional Installation of Administrative Tools
            8. Planning Tool
        2. Technical Overview
          1. Reference Topology
          2. Group Chat
          3. Desktop Sharing Framework
            1. Peer-to-Peer Application Sharing
            2. Multiparty Conference Application Sharing
          4. Server Application Framework
            1. Application Server
            2. Application
            3. Deployment and Topology
            4. Activation
            5. Call Routing
            6. Response Group Topology
            7. Topology
            8. Dial-in Conferencing Architecture
              1. Adding a PSTN User to a Conference
              2. Adding Conferencing Announcement Service to a Conference
            9. Outside Voice Control
          5. SIP Trunking Topology
          6. Media Enhancements
            1. Early Media Support
            2. ICE Protocol Upgrade
            3. Video Negotiation
        3. Summary
        4. Additional Resources
      3. 3. Server Roles
        1. Standard Edition Server
        2. Enterprise Edition Pool
        3. Director Role
        4. Conferencing Servers
          1. IM Conferencing Server
          2. Web Conferencing Server
          3. A/V Conferencing Server
          4. Telephony Conferencing Server
          5. Application Sharing Conferencing Server
        5. Application Server
        6. Monitoring Server
        7. Archiving Server
        8. Edge Servers
          1. Access Edge Server
          2. Web Conferencing Edge Server
          3. A/V Edge Server
        9. Communicator Web Access
        10. Web Components Server
        11. Mediation Server
        12. Group Chat Server
        13. Supported Collocation Server Roles
        14. Summary
        15. Additional Resources
      4. 4. Infrastructure and Security Considerations
        1. Infrastructure and Security Considerations
        2. Understanding How Office Communications Server Takes Advantage of Active Directory
          1. Performing the Prep Schema Step
          2. Performing the Prep Forest Step
          3. Performing the Prep Domain Step
          4. Changes in Active Directory to Support Operations
        3. Using DNS to Publish Office Communications Server
          1. Impact on Server Certificates
          2. Impact on FQDN Configurations
          3. SIP Namespaces
          4. Migrate Users from One SIP Namespace to Another
        4. Securing Office Communications Server with PKI
          1. Configuring the Common Name or Subject Name
          2. Configuring the Subject Alternative Name
          3. Configuring the CRL Distribution Points
          4. Configuring for Enhanced Key Usage
            1. Server Authentication
            2. Client Authentication
          5. Configuring the Certification Path
        5. Scaling with SQL Server
        6. Building Redundancy with Hardware Load Balancing
          1. Port and Protocol Configuration Considerations for Hardware Load Balancers
        7. Bridging VoIP to the PSTN Network by Using a Media Gateway
        8. Firewall Scenarios and Configuration
          1. Back-to-Back Firewall
          2. Three-Legged Firewall
          3. Port and Protocol Configuration for Edge Servers
          4. Examining Rules for Access Edge Servers
          5. Examining Rules for Web Conferencing Edge Servers
          6. Examining Rules for A/V Edge Servers
          7. Examining Rules for the Web Components Server
        9. Summary
        10. Additional Resources
    7. II. Key Usage Scenarios
      1. 5. Basic IM and Presence Scenarios
        1. Understanding the Login Process
          1. Why Talk About the Login Process?
          2. A Login Scenario
            1. Step 1: Signing In to an Account
            2. Step 2: Supplying Account Credentials (If Prompted)
            3. Step 3: The Login Process
            4. Step 4: Login Complete
          3. The Technical Details Behind the Login Process
            1. Pre-Step 1: What Happens During the Initial Launch of Communicator 2007
              1. Enabling the Communicator Protocol Logs
              2. Working with Communicator Application Event Logs
            2. Post-Step 1: What Happens After Sign-In Starts
            3. The Initial Registration
            4. The Authenticated Registration
            5. Step 3: What Happens During Login Processing
            6. Post-Step 4: Post-Login Processing
        2. How Presence Information Is Shared
          1. What Is Presence?
          2. A Presence Sharing Scenario
            1. Step 1: Looking Up a Contact
            2. Step 2: Adding a Contact
            3. Step 3: Receiving an Offline Indication
            4. Step 4: Logging In the Contact and Receiving Updated Presence Information
            5. Step 5: Controlling the Access Level of a Contact
          3. Technical Details Behind the Presence Sharing Scenario
            1. Step 1: What Happens During Looking Up a Contact
            2. Step 2: What Happens When Adding a Contact
            3. Step 3: What Happens When Subscribing for Presence and Receiving an Offline Notification
              1. What Happens During Presence Authorization
            4. Step 4: What Happens When the Contact Logs In and Updated Presence Is Received
            5. Step 5: What Happens When Controlling the Access Level of a Contact
        3. Instant Messaging
          1. An Instant Messaging Scenario
            1. Step 1: Opening a Messaging Window
            2. Step 2: Typing and Sending a Message
            3. Step 3: Receiving the Message
            4. Step 4: Sending a Hyperlink
            5. Step 5: Sending a File
            6. Step 6: Sharing Video
            7. Step 7: Ending the Conversation
          2. The Technical Details Behind the Instant Messaging Scenario
            1. Post-Step 2: What Happens During Session Establishment and Sending a Message
            2. Step 3: What Happens When Receiving a Message
            3. Step 4: What Happens When Sending a Hyperlink
            4. Step 5: What Happens When Sending a File
            5. Step 6: What Happens When Sharing Video
            6. Step 7: What Happens When Ending the Conversation
        4. Summary
        5. Additional Resources
      2. 6. Conferencing Scenarios
        1. Understanding Conferencing User Types
          1. Authenticated Enterprise Users
          2. Federated Users
          3. Anonymous Users
        2. Understanding Conferencing User Roles
        3. Understanding Conference Security and Access Types
          1. Invite Within Network Conferences
          2. Invite Within Network (Restricted) Conferences
          3. Invite Anyone Conferences
        4. Understanding Conferencing Media Types
          1. Multiparty Instant Messaging
          2. Data Collaboration
          3. Audio and Video Conferencing
          4. Audio Conferencing Provider Support
          5. Understanding Communicator Web Access Server R2
          6. Support for Distribution Groups
          7. Audio Conferencing
          8. Desktop Sharing
          9. Hosting for Dial-in Audio Conferencing Web Page
          10. Configuring Communicator Web Access Server R2
            1. Installing and Activating Communicator Web Access
            2. Installing Communicator Web Access
            3. Activating the Communicator Web Access Server
            4. Creating the Virtual Server
            5. Publishing the Communicator Web Access URLs in Active Directory
        5. Examining the Technical Details Behind Conferencing Scenarios
          1. Understanding the Conferencing Architecture
            1. Conferencing Clients
              1. Microsoft Office Live Meeting Console 2007 R2
              2. Microsoft Office Communicator 2007 R2
              3. Microsoft Conferencing add-in for Microsoft Office Outlook
            2. The Conferencing Database
            3. Focus
            4. The Focus Factory
            5. Conferencing Servers and the Conferencing Server Factory
            6. Web Components
            7. Process and Machine Boundaries for Conferencing Components
            8. Edge Servers
            9. The Conferencing Protocols
              1. Signaling Protocols
              2. Media Protocols
          2. Understanding the Conference Life Cycle
            1. Conference Creation
            2. Conference Activation
            3. Conference Deactivation
            4. Conference Expiration
          3. Examining the Technical Details Behind Web Conferencing
            1. The Client Conference Joining Sequence
            2. The Client Join Sequence to the Web Conferencing Server
            3. Conference Control
            4. Web Conferencing Server Content Management
            5. Web Conferencing Server Content Upload and Download
            6. Meeting Compliance
            7. Web Conferencing Content Tools
              1. DMInsider.exe
              2. DMHash.exe
              3. DMDel.exe
          4. Meeting Policy and Policy Enforcement
            1. Conference Access Type Settings
        6. Summary
        7. Additional Resources
      3. 7. Remote Access and Federation Scenarios
        1. Understanding Basic Remote Access Topologies
        2. Single Edge Server Topology
        3. Scaled Single-Site Edge Server Topology
        4. Multisite Edge Server Topology
        5. Understanding Basic Remote Access Scenarios
          1. Understanding Basic Remote Access for IM and Presence Information
          2. Understanding Remote Access for Web Conferencing
            1. Step 1: Use Office Communicator to Start a Conference
            2. Step 2: Accept and Join a Web Conferencing Invitation
            3. Step 3: Begin Sharing an Application
            4. Examining the Web Conferencing Remote Access Scenario
          3. Understanding Remote Access for Audio and Video Conferencing
        6. Understanding Office Communicator Web Access 2007 R2
          1. Enabling Office Communicator Web Access 2007 R2
        7. Understanding Federation
          1. Understanding Direct Federation
            1. Adding a Trusted Federated Partner Domain
          2. Understanding Federated Partner Discovery
          3. Understanding Federation with Public IM Providers
        8. Understanding the Requirements for and Use of Certificates in Federation
        9. Understanding On-Premises Conferencing Rules for Federated and Nonfederated Users
        10. Configuring and Administering Federation
          1. Configuring User Accounts for Federation
          2. Administering Federated Partner Access
          3. Managing Multiple User Accounts
          4. Blocking External Domains
        11. Examining the Technical Details Behind the Federation Scenario
          1. How Clients from Two Federated Domains Get Online and Register Presence
            1. Step 1: REGISTER sip:litwareinc.com SIP/2.0
            2. Step 3: SUBSCRIBE sip:kakers@litwareinc.com SIP/2.0
            3. Step 5: SERVICE sip:kakers@litwareinc.com SIP/2.0
          2. Communication from One Federated Enterprise to Another
            1. Step 1: SUBSCRIBE sip:jpeoples@fabrikam.com SIP/2.0
            2. Step 2: BENOTIFY and OK 200
            3. Step 8: INVITE sip:jpeoples@fabrikam.com SIP/2.0
            4. Step 12: INFO
            5. Step 13: MESSAGE
            6. Step 19: BYE
        12. Summary
        13. Additional Resources
      4. 8. Public IM Connectivity Scenarios
        1. What Is Public IM Connectivity?
        2. Public IM Connectivity Scenarios
          1. Configuring Public IM Connectivity
          2. Enabling Federation with Public IM Service Providers
            1. Step 1: Provision of Federation with the Public IM Service Providers
            2. Step 2: Configure DNS for the Access Edge Server
            3. Step 3: obtain a Public Certificate
            4. Step 4: Configure the Access Edge Server for Federation
            5. Step 5: Enable Connections to Public IM Service Providers
            6. Step 6: Authorize Users for Public IM Connectivity
            7. Provisioning Federation with the Public IM Service Providers
            8. Enabling Connections to Public IM Service Providers
          3. Considerations Involving Public IM Providers
          4. Existing Accounts on Provider Networks
          5. Capacity Planning Considerations
          6. Security Considerations
            1. Controlling SPIM by Limiting Public Contacts
              1. Limiting SPIM when you Enable Users in Active Directory Users and Computers
              2. Limiting SPIM when You Enable Im Service Providers
              3. Limiting SPIM when Enabling Users that are on a Recipient’s Contact List
            2. Controlling SPIM by Limiting Message Content
          7. Considerations Involving Media Sharing
          8. Authorizing Users for Public IM Connectivity
            1. Using the Active Directory Users and Computers Snap-In
            2. Using the office Communications Server Administrative Snap-In
            3. Disabling Public IM Connectivity
            4. Configuring Per-User and Global Settings
        3. Technical Details Behind the Public IM Connectivity Scenarios
          1. Scenario one: Adding a Contact in office Communicator 2007
            1. Step 1: Specify Recipient’s Account
            2. Step 2: Recipient’s Presence Displayed as Unknown
            3. Step 3: Recipient’s Account Added as a Contact
            4. Step 4: Recipient’s Presence Displayed as offline
            5. Step 5: Recipient Receives Notification
            6. Step 6: Recipient Adds a User to the Buddy List
            7. Step 7: Recipient’s Presence Displayed as Online
          2. Scenario Two: Sending a Single Message
            1. Step 1: User Selects a Recipient from the Buddy List in Office Communicator
            2. Step 2: User Types a Message to a Recipient
            3. Step 3: Recipient Receives a Message from a User
            4. Step 4: Recipient Types a Reply to the User
            5. Step 5: User Receives a Message from the Recipient
            6. Step 6: Conversation Finished
        4. Summary
        5. Additional Resources
      5. 9. Remote Call Control Scenarios
        1. A Remote Call Control Scenario
        2. What Functionalities Are Available?
        3. Setting Up the Remote Call Control Scenario
          1. Step 1: Installing the SIP/CSTA Gateway and Configuring the SIP/CSTA Interface
          2. Step 2: Configuring a User for RCC
          3. Step 3: Configuring a Route on the Office Communications Server Pool for the Server URI
          4. Step 4: Normalizing Phone Numbers
        4. Understanding the Technical Details Behind the RCC Scenario
          1. Bootstrapping
          2. Receiving a Call
          3. Making a Call
        5. Summary
        6. Additional Resources
      6. 10. Dual Forking Scenarios
        1. What Is Dual Forking?
        2. Overview of Dual Forking Scenarios
          1. Originating a Two-Party Call
          2. Answering a Two-Party Call
          3. In Call Experience
          4. Conferencing Experience
          5. Configuring Call Forwarding
        3. Examining Technical Details Behind Dual Forking Scenarios
          1. Understanding RCC in Dual Forking Scenarios
          2. Understanding Loop Detection
          3. Understanding Routing Rules in Dual Forking Scenarios
          4. Understanding Phone Numbers in Dual Forking Scenarios
          5. Understanding Normalization in Dual Forking Scenarios
        4. Configuring Dual Forking
        5. Summary
        6. Additional Resources
      7. 11. VoIP Scenarios
        1. What Is VoIP?
        2. Overview of VoIP Scenarios
          1. Using Two-Party Calling
          2. Configuring Call Deflection
          3. Configuring Call Forwarding
          4. Using Voice Mail
          5. Using Ad Hoc Conference Calling
          6. Using Office Communicator and Phone Edition Integration
          7. Using Response Group Service
        3. Examining the Technical Details Behind VoIP Scenarios
          1. Understanding How Outbound Calls Are Routed
            1. Understanding Voice Policies
            2. Understanding Phone Usage
            3. Understanding Phone Routes
          2. Understanding How Inbound Calls Are Routed
          3. Understanding Normalization
          4. Understanding Office Communicator to Office Communicator Phone Edition Integration
        4. Configuring VoIP
          1. Configuring Global Enterprise Voice Settings
            1. Configuring Voice Policies
            2. Configuring Phone Routes
            3. Configuring Location Profiles
          2. Configuring Users for Unified Communications
          3. Configuring the Media Gateway
          4. Configuring the Mediation Server
        5. Summary
        6. Additional Resources
      8. 12. Voice Mail Scenarios
        1. Overview of Voice Mail Scenarios
          1. Redirecting Incoming Calls to Voice Mail
          2. Call Forwarding to Voice Mail
          3. Calling Your Voice Mail
          4. Listening to Voice Mail
          5. Call Logs
          6. Leaving a Voice Mail
          7. Subscriber Access
          8. Auto-Attendant
        2. Examining the Technical Details Behind the Voice Mail Scenario
        3. Configuring Voice Mail
          1. Configuring Exchange Unified Messaging
            1. Step 1: Configuring Exchange UM Servers
            2. Step 2: Creating a UM Dial Plan for Every Location Profile
            3. Step 3: Configuring the Subscriber Access Number
            4. Step 4: Running the PowerShell Tool ExchUCUtil.ps1
            5. Step 5: Creating a UM Auto-Attendant
            6. Step 6: Configuring Users for Exchange UM
          2. Configuring Office Communications Server
        4. Summary
        5. Additional Resources
      9. 13. Enterprise Voice Application Scenarios
        1. What Is Enterprise Voice?
        2. Overview of Enterprise Voice Scenarios
          1. Response Group Service Scenarios
            1. Interactive Voice Response
            2. Call Queuing, Timeout, and Overflow Actions
          2. Conferencing Attendant Scenarios
        3. Examining the Technical Details Behind Enterprise Voice Scenarios
          1. Response Group Service Architecture
            1. Overview of the Different Components on which the Response Group Service Is Built
            2. Understanding the Hosting Component
            3. Understanding the Workflow Runtime Component
            4. Understanding the Match Making Component
            5. Understanding the Call Routing Component
            6. Understanding the Call Flow
          2. Conferencing Attendant Architecture
            1. Understanding How External PSTN Callers Join the Conference
            2. Understanding How Authenticated PSTN Callers Join the Conference
        4. Configuring Enterprise Voice Applications
          1. Configuring the Response Group Service
            1. Terminology
            2. Overview of the Management Model
            3. Installing the Response Group Service
            4. Deploying a Response Group
              1. Step 1: Create the Contact Objects to be Used for your Response Groups
              2. Step 2: Define the Set of Agents, Groups, and Queues that Handle Calls Received by the Response Groups
              3. Step 3: Select and Configure the Response Group Template for Definition of the Caller Experience
              4. Step 4: Deploy the Office Communicator Tab for Formal Agents
              5. Step 1: Contact Object Creation
              6. Step 2: Agents, Groups, and Queue Configuration
              7. Step 3: Template Selection and Configuration
              8. Step 4: Deploying the Agent Tab for Formal Agents
          2. Configuring Conferencing Attendant
        5. Summary
        6. Additional Resources
    8. III. Planning and Deployment
      1. 14. Planning Example
        1. Defining a Statement of Work
        2. Gathering and Defining Business Requirements
          1. Assigning a Priority to Each Requirement
        3. Mapping Business Requirements to Office Communications Server 2007 R2 Features
          1. Office Communications Server 2007 R2 Planning Tool
            1. Using the Office Communications Server 2007 R2 Planning Tool
        4. Determining Interoperational Requirements
        5. Performing a Gap Analysis
        6. Architectural Design of the Solution
        7. Output to the Deployment Team for Development of the Deployment Plan
        8. Summary
        9. Additional Resources
      2. 15. Deployment Example
        1. Understanding Litware, Inc.’s Deployment Process for Office Communications Server 2007 R2
          1. Establishing a Server Naming Convention
          2. Preparing the Server Hardware
          3. Litware, Inc.’s Deployment Path
            1. Preparing Active Directory
            2. Overview of Preparing Firewall Ports, Certificates, NICs, and DNS
            3. Preparing DNS, Firewall Ports, and Certificates for the Chicago Deployment
            4. Preparing DNS and Firewall Ports for the Paris Deployment
            5. Preparing DNS and Firewall Ports for the Singapore Deployment
          4. Litware, Inc.’s Deployment Path for Chicago
            1. Litware, Inc.’s Deployment Path for Paris
            2. Litware, Inc.’s Deployment Path for Singapore
        2. Final Litware, Inc. Architecture
        3. Summary
        4. Additional Resources
    9. IV. Operations and Administration
      1. 16. Monitoring
        1. Event Logs
          1. Using the Administrative Tool to View Office Communications Server Events
          2. Accessing the Event Log by Using Scripts
        2. Performance Monitoring
          1. Monitoring Performance Using the Administrative Tool
          2. Modifying the Default Counter Sets
        3. The Archiving Server and the Monitoring Server
          1. The Archiving Server
          2. The Monitoring Server
            1. Monitoring Server Reports
              1. Installing Monitoring Server Reports
          3. Accessing the Archiving Server and the Monitoring Server Databases
            1. Accessing the Databases by Using the ArchivingCdrReporter Tool
            2. Adding Custom Queries to ArchivingCdrReporter
            3. Accessing the Databases by Using Scripts
            4. Viewing the Database Schemas
        4. Deployment Validation Tool
          1. Using Answering Agents
            1. Installing an Answering Agent
          2. Running Formal Tests with the Deployment Validation Tool
            1. Installing the Deployment Validation Tool
            2. Running Tests and Viewing Reports
        5. Summary
        6. Additional Resources
      2. 17. Backup and Restore
        1. Planning for Backup and Restore
          1. Backup and Restore Requirements
          2. Backing Up Settings
            1. Backing Up Pool, Global, and Computer Settings
          3. Backing Up Office Communications Server Data
            1. Backing Up Databases
            2. Backing Up File Shares
          4. Best Practices
            1. Guidelines for Backup and Restoration
            2. Guidelines for Minimizing the Impact of a Disaster
        2. Restoring Service
          1. Verifying Restoration Prerequisites
            1. Preparing to Use an Existing Server’s Hardware and Software for Database Recovery
            2. Recovering an Existing Server
            3. Reinstalling an Existing Server
          2. Installing Restoration Tools
          3. Restoring Data
            1. Restoring Databases
            2. Restoring File Shares
          4. Restoring Settings
            1. Step 1: Prepare for Restoration of Settings
            2. Step 2: Restore Settings
            3. Step 3: Activate Servers
            4. Step 4: Start Services
            5. Step 5: Validate Services
            6. Next Steps
          5. Re-creating Enterprise Pools
          6. Reassigning Users
          7. Restoring Domain Information
          8. Restoring Sites
            1. Step 1: Determine the Recovery Support to Be Provided by the Secondary Site
            2. Step 2: Create a Deployment Plan and Restoration Strategy for the Secondary Site
            3. Step 3: Set Up the Secondary Site
            4. Step 4: Prepare the Primary Site to Support Recovery at the Secondary Site
            5. Step 5: Maintain the Secondary Site
            6. Step 6: Validate Site Recovery Capabilities by Simulating an Outage
            7. Step 7: Bring the Secondary Site Online
            8. Step 8: Restore the Primary Site and Bring It Back Online
        3. Summary
        4. Additional Resources
      3. 18. Administration
        1. Configuring Global Settings
          1. Configuring Enterprise Voice Settings
          2. Configuring Policy-Specific Settings
          3. Configuring Service Connection Point Settings
          4. Configuring Trusted Server Settings
          5. Configuring User-Specific Settings
          6. Configuring Conference Directory Settings
          7. Configuring Application Contact Object Settings
          8. Configuring Conference Auto Attendant Settings
        2. Configuring Pool Settings
          1. Configuring Front-End Pool Properties
          2. Configuring MCU Pool Properties
          3. Configuring Web Component Pool Properties
          4. Configuring Response Group Service Pool Properties
          5. Configuring Miscellaneous Pool Properties
        3. Configuring Server Settings
          1. Configuring Settings for All Servers
          2. Configuring Settings for Standard Edition and Enterprise Edition Servers
          3. Configuring Application Server Settings
          4. Configuring Archiving Settings
          5. Configuring Monitoring Server Settings
          6. Configuring Conferencing Server Settings
          7. Configuring Communicator Web Access Server Settings
          8. Configuring Mediation Server Settings
          9. Configuring Edge Server Settings
          10. Configuring Federation Settings
        4. Migrating to Office Communications Server 2007 R2
          1. Migration Process
        5. Summary
        6. Additional Resources
      4. 19. Client and Device Administration
        1. Office Communicator 2007 R2
          1. Generating a Log File
          2. Using Group Policy Settings
          3. Communicator 2007 R2 Call Configurations
            1. Standalone Communicator 2007 R2 (TelephonyMode=1)
            2. Coexistence of Communicator 2007 R2 and PBX (TelephonyMode=2)
            3. Dual Forking (TelephonyMode=3)
          4. What Happens During User Sign-In
            1. Understanding Client Automatic Configuration and DNS Discovery
          5. Understanding Office Communicator Compatibility
            1. Communicator 2005 and Communicator 2007 R2 Compatibility
            2. Office Communicator 2007 R2 and Microsoft Office Compatibility
            3. Microsoft Exchange Server and Office Communicator 2007 R2 Compatibility
            4. Microsoft Windows and Office Communicator 2007 R2 Compatibility
            5. Exchange Server Communication Interfaces
          6. MUI Pack for Office Communicator 2007 R2
        2. Office Live Meeting 2007 R2
          1. Office Live Meeting 2007 R2 Registry Keys
          2. Live Meeting Registry Keys Shared with Office Communicator 2007 R2
        3. Multiple Client Installation Script
        4. Group Policy for Unified Communications Clients
          1. How Group Policy Works
            1. Adding Administrative Templates
          2. Office Communicator 2007 R2 Group Policy Settings
            1. Communicator 2007 R2 Group Policy Precedence
          3. Office Live Meeting 2007 R2 Group Policy
        5. Response Group Service Clients
        6. Communicator Phone Edition
          1. DHCP and Communicator Phone Edition
            1. DHCP Search Options
            2. Microsoft Exchange Server 2007 Autodiscover
            3. How Communicator Phone Edition Retrieves Outlook Contacts, Call Logs, and Voice Mail
            4. Communicator Phone Edition Query Order of Microsoft Exchange Server 2007
          2. Troubleshooting Contacts, Call Logs, and Voice Mail on Communicator Phone Edition
          3. NTP and Communicator Phone Edition
            1. NTP Time Provider
          4. Server Security Framework Overview
            1. Root CA Certificate for Communicator Phone Edition
            2. Using Communicator Phone Edition Certificates
            3. Enterprise Root CA Chain
            4. Trusted Authorities
        7. RoundTable Management
          1. Installing the Microsoft RoundTable Management Tool
            1. Using Rtmanage.exe
          2. Common Configuration Tasks
            1. Set the Time
            2. Change the Display Language
            3. Change the Time Zone
            4. Get the Device’s Current Configuration
            5. Update the Firmware Images
            6. Reset the Device to Factory Settings
            7. Reset the Device Password
            8. Upload the Diagnostics Logs
            9. Interpreting the Diagnostics Logs
        8. Summary
        9. Additional Resources
    10. V. Technical Troubleshooting and Diagnostics
      1. 20. Diagnostic Tools and Resources
        1. Identifying Diagnostic Tools by Scenario
        2. Using Server Setup Logs
          1. Usage Example
        3. Using Event Logs
          1. Usage Example: Using Event Logs
        4. Using the Validation Wizard
        5. Using Client and Server Trace Logs
          1. Understanding Office Communicator Traces
            1. Configuring Trace Settings
            2. Looking at Trace Files
            3. Using ClientLogReader
            4. Media Logging
          2. Understanding Office Communications Server Traces
            1. Example of Gathering a Server Trace
          3. Understanding Office Communicator Mobile Traces
          4. Understanding Office Communicator Phone Edition Traces
          5. Understanding Microsoft RoundTable Traces
        6. Using Snooper
        7. Using Best Practices Analyzer
        8. Summary
        9. Additional Resources
      2. 21. Troubleshooting Problems
        1. Troubleshooting Process
          1. Determining the Root Cause
            1. Understanding the Symptoms
            2. Collecting Information
              1. Installation Logs
              2. Event Logs
              3. Validation Wizards
              4. Best Practices Analyzer
              5. Client Logging (UCCAPI LOGS)
            3. Reducing Complexity
            4. Isolating the Component
            5. Researching Your Findings
          2. Resolving the Issue
        2. Troubleshooting Common Problems
          1. Common Communicator Scenarios
            1. Scenario 1: Resolving Issues That Involve DNS Service Record Locator Queries
              1. Description of Problem
              2. Troubleshooting
              3. Next Steps
            2. Scenario 2: Resolving Issues That Arise from Certificate Negotiation Failures
              1. Description of Problem
              2. Troubleshooting
              3. Next Steps
          2. Troubleshooting Web Conferencing
            1. Problem Description
            2. Troubleshooting
          3. Next Steps
          4. Troubleshooting External Audio/Video
            1. Description of Problem
            2. Troubleshooting
            3. Next Steps
        3. Summary
        4. Additional Resources
      3. 22. Routing and Authentication
        1. Understanding Session Initiation Protocol
          1. Common SIP Requests
            1. Register
            2. Subscribe and Notify
            3. Service
            4. Invite
            5. ACK
            6. Cancel
            7. Bye
            8. Message
          2. Common SIP Responses
            1. Informational
            2. Success
            3. Redirection
            4. Client Error
            5. Server Error
            6. Global Failure
          3. How Office Communications Server Uses SIP
        2. Understanding SIP Routing
          1. SIP Routing Headers
            1. Record-Route Headers
            2. Route Headers
            3. Via Headers
            4. Contact Headers
            5. Route Signatures
          2. How Office Communications Server Uses SIP Routing
        3. Understanding the Globally Routable User Agent URI
          1. GRUU Creation
          2. How Office Communications Server Uses GRUU
        4. Understanding Authentication
          1. NTLM Overview
          2. Kerberos Overview
          3. Security Association Establishment
            1. Refreshing a Security Association
            2. Pre-Authentication of a Message
          4. How Office Communication Server Uses NTLM
          5. How Office Communication Server Uses Kerberos
          6. Troubleshooting Authentication
        5. Summary
        6. Additional Resources
    11. A. About the Authors
    12. B. System Requirements
      1. For OCS-All.ps1 PowerShell Script
      2. For Resource Kit Tools and Reference Material
    13. Index
    14. About the Authors
    15. SPECIAL OFFER: Upgrade this ebook with O’Reilly