...Cisco Unified Presence Deployment Guide Release 6.0(1) Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Customer Order Number: Text Part Number: OL-12732-02 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS...
Words: 13683 - Pages: 55
...set limits in counseling between you as the counselor and your client), empathic counselor (being able to understand your clients feelings and grasp where those feelings are coming from), Self-Awareness (counselors encourage clients though process of belief that they can achieve anything, have faith in the clients you work with but also be aware that not everything they tell you is the truth), lastly collaboration (by working together as a system and using your people skills your collaboration with your client will be more effective). An ineffective characteristic that I got from the media was codependency, making sure to pay attention to times when counselors become too involved in their clients therapy or lives and are not creating the active listening environment, this may lead to not helping the client heal and become a more positive person and get better in the long run. In the case study two effective characteristics that I believe to be effective are when the counselor as the client to tell him more about the anger issues. This is effective because it opens up more questions that the counselor...
Words: 845 - Pages: 4
...there are roles to be configured. Some roles are configured differently do if your implementing it in a small or large business setting. You have two different server roles one being the mailbox server role and the other being the client access server role. Each role is in charge of different task the mailbox server role is in charge of Clients access protocols, transport service, mailbox database, unified messaging and handles all activities for any active mailbox on the server (TechNet, 2013). With the client access role it handles authentication, redirection, proxy services (HTTP, POP, IMAP, and SMTP), and stores all diagnostic logs (TechNet, 2013). Each of these roles and services serves a unique purpose in setting up your exchange environment. The mailbox server role is the most common role used in Exchange Server and some could say that it is the core of an exchange organization when the mailbox server role is installed on to a server they become what is called a mailbox server. Mailbox servers interact directly with active directory, client access servers and Microsoft outlook clients. When setting up a mailbox server it is smart to consider a few things like requirements. First we have mailbox capacity the average mailbox receives 37mbs of mail per a five day work week with a message size of 75kbs (TechNet, 2011), so in a small or large business you have to take mailbox capacity in to consideration also it would be smart to enable single item recovery, with single item...
Words: 783 - Pages: 4
...applications to not run properly or at all, but worse, could create security vulnerabilities for the network. A static IP address allows other workstations on the network to easily keep track of the server. 4. Explore the netsh command menus. Record three commands that you can issue from the command line using netsh, and describe what each command does. 1. Exec- runs a script file 2. Add- adds a configuration entry to a list of entries 3. Online- sets the current mode to online Matt Carlson IT255.XM1.10WTR Instructor Vincent Tran January 9, 2010 Virtual Lab 2 1. When a child domain is installed and the parent domain is hosting an Active Directory–integrated DNS server that allows dynamic updates, are the SRV resource records of the child domain added automatically during Active Directory installation? Yes, they are added automatically during...
Words: 3462 - Pages: 14
...AD FSMO Role Management Research: Alternate Methods A junior administrator has been tasked with documenting current FSMO role holders and GC Servers, as well as documenting procedures for responding to FSMO Role unavailability but, he addresses IT administrator with a few concerns: How to determine which DCs currently hold which roles and determine which DCs are Global Catalog Servers. He also needs to develop a plan for failure of a role holder. Active Directory is a multimaster database which means that updates can be made by any writeable DC. Some sensitive operations need to be controlled more stringently than others, such as schema management and adding or removing additional domains from an AD forest. These specified roles are called Flexible Single Master Operations (FSMO). This means only one DC in the replica ring can provide a particular operation. To find which roles a DC currently hold you can use the ntdsutil. From the start menu, key roles and press enter, key connections press enter, key connect to server and server name and domain press enter, key quit and press enter, key select operation target press enter, key list roles for connected server and press enter and quit. There are other ways to find which roles a DC currently holds, such as: * You must know the default settings. By default the first domain controller installed in the forest root domain is designated as a global catalog server. * Schema snap-in * AD Domains and Trusts snap-in ...
Words: 476 - Pages: 2
...DHCP server except what? Workstation settings 12. What zone would a DNS server may have? Primary zone 13. What is in a forward/reverse lookup zone? Primary,secondary, and stud 14. If you have a IP based on name, what type of zone is it? Reverse lookup zone 15. If you have Server 2008 with DS role is has? Domain controller 16. If you have domain controller, what is the process called for keeping it up to date? Replication 17. The “read only” domain controller holds this file? NTDS.Dit 18. Distinguished name includes the entire name (whole hierarchal structure). 19. Dc promo.exe makes the wizard to make server a domain controller. 20. What is the minimum numory requirement for active directory? 200 MB 21. Application directory partitions are used to divide forest wide DNS info from Domain wide info. 22. How often the intersight replication occurs? Every 15 minutes 23. In order...
Words: 654 - Pages: 3
...-------------------------------------------- Complete the following sentences by writing he correct word o words in the blank provided. 1. Active Directory will tolerate a maximum of a 5- minute clock skew between a client and the domain controller that authenticates it. 2. The PDC Emulator is responsible for managing time synchronization within a domain. 3. You can improve login times in a site that does not contain a global catalog server by implementing universal group membership caching. 4. To add or remove an application directory partition from Active Directory, the Domain Naming Master needs to be accessible. 5. If a domain controller that holds a FSMO role fails and will not be returned to the network, you can seize the FSMO role to another domain controller. 6. You can add additional attributes to the partial attribute set (PAS) by modifying the Active Directory schema. 7. The security identifier (SID) uniquely identifies an object within an Active Directory domain, but will change if an object is moved from one domain to another. 8. The Infrastructure Master FSMO role should not be housed on a domain controller that has been configured as a global catalog. 9. You can transfer the Domain Naming Master FSMO from one domain controller to another using the Active Directory Domains and Trusts MMC snap-in. 10. Membership information for a (an) universal group is stored on the global catalog. ...
Words: 394 - Pages: 2
...Tyree Hawkins Network Consulting Alexandria, VA To MAB Law Firm This report provides an analysis and evaluation of the current network infrastructure and plan combination of the Network infrastructure for Myrtle & Associates and Belleview Law Group. The current network at Myrtle & Associates consists of three servers, a domain controller, a file server, and an application server. They also have a wireless network for their paralegals, and attorneys. This will allow them to access the network from their laptops and from their smartphones. Belleview Law has a legacy network that needs some upgrading. Their network consists of four servers, a Novell directory server, a file server and two legacy management servers. There is no wireless serves for their paralegals and attorneys. My plan is to bring the two networks together in a way that will save money and provide a more efficient way to access information on the network. As it stands there are two problems that need to be addressed. The first issue is that Belleview’s network has a Novell Directory server whereas Myrtle & Associates has a domain controller. The other issue is Belleview’s network has two legacy management servers. These two issues will make migrating data a little challenging. The new network will be a bus star topology. This will help with redundancy and it will have a wireless access point. My first plan will be to transfer the Novell directory server data to the Windows domain controller...
Words: 266 - Pages: 2
...NORTHCENTRAL UNIVERSITY ASSIGNMENT COVER SHEET Learner: Barry C. Archie THIS FORM MUST BE COMPLETELY FILLED IN Please Follow These Procedures: If requested by your mentor, use an assignment cover sheet as the first page of the word processor file. The assignment header should include the Learner’s last name, first initial, course code, dash, and assignment number (DoeJXXX0000-1) justified to the left and the page number justified to the right. Keep a Photocopy or Electronic Copy of Your Assignments: You may need to re-submit assignments if your mentor has indicated that you may or must do so. Academic Integrity: All work submitted in each course must be the Learner’s own. This includes all assignments, exams, term papers, and other projects required by the faculty mentor. The known submission of another person’s work represented as that of the Learner’s without properly citing the source of the work will be considered plagiarism and will result in an unsatisfactory grade for the work submitted or for the entire course, and may result in academic dismissal. || CT7001|Christopher Stabile| || The Role of the Teacher Practitioner|ArchieBCT7001-4| || Faculty Use Only Personal Capacities Barry C. Archie Northcentral University Reflective Practice requires possession of specific skill-sets in order to increase pedagogical efficiency. York-Barr, Sommers, Ghere...
Words: 3106 - Pages: 13
...Page 179, 198-199 1. In a case where multiple PSOs are configured for a particular user, Active Directory will determine which one to apply by using the PSO’s msDS-PasswordSettingsPrecedence 2. You can automatically add a technical support user to the local Administrators group of each domain workstation by using Restricted Groups. 3. The gpupdate.exe command allows you to manually refresh group policy settings on a particular computer. 4. Tattooing refers to a Group Policy setting that is not removed when the GPO setting reverts to “Not Configured” 5. You would audit Account Logon Events to determine who is authenticating against your Active Directory domain controllers. 6. Each Active Directory domain controller acts as a Key Distribution Center to enable the distribution of Kerberos tickets. 7. Folder Redirection allows you to configure a user’s Documents, Desktop, and other folders so that they are stored on a network drive rather than the local computer 8. Settings in the Kerberos Policy section of Group Policy allow you to configure the maximum allowable clock skew between a client and a domain controller. 9. Auditing for Policy Change Events will alert you when a change is made to User Rights assignments, IPSec policies, or trust relationships. 10. You can create a consistent service startup configuration for multiple computers by using the System Services node in Group Policy. Matching: 1. This feature of Group...
Words: 481 - Pages: 2
...[pic] Active Directory Benefits for Smaller Enterprises Microsoft Corporation Published: September 2004 Abstract Microsoft® Active Directory® (AD) has been available since early 2000, and while most organizations have completed their AD deployment and are realizing the many business benefits of having deployed Active Directory, there are still organizations that have either not completed their deployment or have yet to take advantage of some of the important features of Active Directory that yield the greatest business benefits. This whitepaper is designed to help small and medium-sized organizations understand the business advantages that can be realized quickly and easily through the use of Windows Server 2003 and Active Directory. This paper was written based on feedback from hundreds of business executives on the reasons they chose to migrate to Active Directory, and the ongoing benefits they have realized. The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This White Paper is for informational purposes only. MICROSOFT...
Words: 7075 - Pages: 29
...Southwest, and Southeast. The Central location has 500 client computers and two network servers. Each of the Northwest and Northeast locations has approximately 75 client computers and one server computer. Each of the Southwest and Southeast locations has 100 client computers and one network server. Figure 1 illustrates the company's network infrastructure. Figure 1 City Power & Light network infrastructure S1, S2, S3, S4, S5, and S6 are servers on the City Power & Light network. All of these servers run Windows Server 2008, Standard Edition. All client computers run Windows XP Professional. All computers are configured in a single workgroup named WORKGROUP. Andy Ruth, director of City Power & Light, asks you to design an Active Directory infrastructure for the company. He wants everyone to have single sign-on capabilities to every server in the network. He tells you that all users use the same applications and have roughly equivalent configurations. He thinks that the 56 Kbps links are a little slow for the company, and he wants to have control over traffic sent across those links. However, the T-1 links can handle more traffic without a problem. Andy tells you that no special security needs require isolating any of the remote locations from the central location. Based on what you know about the City Power & Light network infrastructure, answer each of the following questions. Include an explanation of why you chose each answer, based the information provided...
Words: 415 - Pages: 2
...dominio Roles y Características Una vez instalado Windows Server 2008 y configuradas algunas opciones básicas de Windows Server 2008 desde el Panel de Control o desde el Administrador del Servidor, las siguientes tareas a realizar es configurar la función o rol que debe desempeñar el servidor dentro de nuestra infraestructura de red. Un solo servidor puede realizar la labor de varios roles o funciones, pero dependiendo de la calidad de servicio, número de usuarios, cantidad de tráfico en la red, etc., puede ser necesario la instalación de servidores especializados, como pueden ser servidores de archivos, servidores de impresión, servidores web, etc. ¿Qué es un Rol? Un rol consiste en una función principal de un servidor, en un servidor se pueden instalar una o varios roles según decidan los administradores del sistema. Cada rol puede incluir uno o varios servicios o elementos de instalación opcionales. En Windows Server 2008 están disponibles los siguientes Roles: 1 2 Para acceder a la gestión de roles, debemos ejecutar el Administrador de Servidor, en el apartado roles, haciendo clic con el botón derecho de ratón nos permite agregar, eliminar roles etc. 3 ¿Qué es una característica? Las características son programas que aunque no forman parte directamente de los roles, complementan sus funcionalidades, independientemente de los roles que estén instalados. Por ejemplo, la característica de Cliente Telnet nos permite comunicarnos remotamente a un servidor...
Words: 1805 - Pages: 8
...LAB #1 – ASSESSMENT WORKSHEET Configure Active Directory and Implement Departmental and User Access Controls Course Name and Number: Student Name: Instructor Name: Lab Due Date: Overview In this lab, you configured Windows Active Directory to create Department and User accounts, and set unique read/write folder and fi le access privileges. You used the Windows Configuration Applet and Group Policy Management console to create and test configurations and read/write of several fi les with specific access controls. You also used group policy objects to restrict access to certain users and groups at the directory, folder, and fi le level. Lab Assessment Questions & Answers 1. Relate how Windows Server 2008 R2 Active Directory and the configuration of access controls achieve CIA for departmental LANs, departmental folders, and data. 2. Is it a good practice to include the account or user name in the password? Why or why not? 3. To enhance the strength of user passwords, what are some of the best practices to implement for user password definitions to maximize confidentiality? 4. Can a user defined in Active Directory access a shared drive if that user is not part of the domain? 5. Does Windows Server 2008 R2 require a user’s logon/password credentials prior to accessing shared drives? 6. When looking at the Active Directory structure for Users and Computers, which group has the least amount of implied privileges? 7. When granting access to LAN systems for guests (i...
Words: 363 - Pages: 2
...The Art of Listening www.humanikaconsulting.com Learning outcomes • Explain what we mean by listening skills • Identify why listening skills are important, from an employability perspective • Identify key reasons why we often fail to listen effectively • Adopt simple listening techniques to ensure that you listen effectively Introduction • Almost 45% of time we spend in listening. • An essential management and leadership skill. • A process of receiving, interpreting and reacting to a message. • Difference between listening & hearing Why Be A Good Listener? Needs of the Customer… • To be recognized and remembered • To feel valued • To feel appreciated • To feel respected • To feel understood • To feel comfortable about a want or need Traits of a Good Listener • • • • • Being non-evaluative Paraphrasing Reflecting implications Reflecting hidden feelings Inviting further contributions • Responding non-verbally Percentage of Communication Mode of Communication Writing Reading Speaking Listening Formal Years of Training 12 years 6-8 years 1-2 years 0-few hours Percentage of Time Used 9% 16 % 30% 45% Listening is the most powerful form of acknowledgment …a way of saying, “You are important.” Listening builds stronger relationships …creates a desire to cooperate among people because they feel accepted and acknowledged. Listening promotes being heard …”Seek first to understand, then be understood.” - Stephen Covey Listening creates...
Words: 1453 - Pages: 6