SlideShare une entreprise Scribd logo
1  sur  145
Unified Communications
and Collaboration:
Lync’ing IT All Together
IlseVan Criekinge
Office365 Technology Advisor
Microsoft BeLux
Ilse Van Criekinge
 • Technology Advisor Core UC
 • Microsoft Belux

     http://blogs.technet.com/ilvancri
     ilvancri@microsoft.com
     @ivcrieki
Agenda

   Introduction
   Out of the Box
   Exchange + RMS
   Exchange + SharePoint
   Exchange + Lync
   Lync + SharePoint
   On Premises - Online
Future of Communications
                   Communications Today
   Instant                            Video                                      Web              E-mail and          Audio
Messaging (IM)      Voice Mail     Conferencing          Telephony            Conferencing        Calendaring      Conferencing




                                     Telephony                                       Instant
                                                                     Unified        Messaging
                                        and
                                     Voice Mail     E-mail and    Conferencing:
                                                    Calendaring   Audio, Video,
                                                                      Web




                                    Authenticatio                                 Authenticatio
  Authenticatio                                                                                                     Authenticatio
                                         n                                             n
       n                                                                                                                 n
                                    Administratio                                 Administratio
  Administratio                                                                                                     Administratio
                                         n                                             n
       n                                                                                                                 n
                                      Storage                                       Storage
    Storage                                            Authentication                                                 Storage
                  Authentication                                                                  Authentication
                                                    Authentication
                  Administration                       Administration
                                                                                                  Administration
                     Storage                        Administration
                                                       Storage
                                                                                                     Storage
                                                         Storage
                                                     Compliance



              On-Premises                                Hybrid                                   In the Cloud
Agenda

   Introduction
   Out of the Box
   Exchange + RMS
   Exchange + SharePoint
   Exchange + Lync
   Lync + SharePoint
   On Premises - Online
Setting the Scene
   DC01 = Windows 2008 R2
   EX01 = Windows 2008 R2 + Exchange 2010 Sp2
   LYNC01 = Lync 2010
   SP01 = SharePoint 2010
Out Of The Box

    Presence integration =
     embedded presence
     and click-to-
     communicate in
     SharePoint sites
Out Of The Box, But...

    Users must have Office 2010, Office
     2007, or Microsoft Office 2003 with the
     latest service pack installed to view
     extended presence information on a
     SharePoint Server page!
    The name.dll file is an ActiveX® control
     that calls the Lync API directly to request
     and display presence status within
     SharePoint site collections.
Agenda

   Introduction
   Out of the Box
   Exchange + RMS
   Exchange + SharePoint
   Exchange + Lync
   Lync + SharePoint
   On Premises - Online
Information Protection and
Control
 Exchange Server 2010 helps prevent the unauthorized transmission of
       sensitive information with tools that can automatically:
    MONITOR e-mail for specific content, recipients and other
     attributes
    CONTROL distribution with automated, granular polices
    PROTECT access to data wherever it travels using rights
     management
    PREVENT
         Violations of corporate policy and best practices
         Non-compliance with government and industry regulations
         Loss of intellectual property and proprietary information
         High-profile leaks of private information and customer records
         Damage to corporate brand image and reputation
Benefits of Automated Controls
     Reduce User Error
     • Majority of data loss incidents are accidental
     • Users forget policies or apply incorrect policy



     Enable More Consistent Policy
     • Automation facilitates rapid policy changes across the
         organization
     •   Critical for internal/external governance and compliance


     Improve Efficiency
     • Offload complex data polices from users
     • Enable centralized policy creation, execution and
         management
Benefits of Granular Controls
       Mailtips      Transport Rules (Exchange/FOPE/EHE)

         Alert       Modify          Protect       Redirect
    ―Allow delivery   ―Allow         ―Allow         ―Block
      but add a      delivery      delivery but    delivery
      warning.‖     but modify      prevent          and
                    message.‖     forwarding.‖    redirect.‖



      LESS RESTRICTIVE                            MORE RESTRICTIVE


             Classify        Append         Review        Block
              ―Allow          ―Allow         ―Block      ―Do not
           delivery but    delivery but     delivery     deliver.‖
              apply           add a           until
          classification.‖ disclaimer.‖   reviewed.‖

            Message         Transport      Moderated           Transport
          Classification      Rules         Mailbox              Rules
Information Rights
Management
    Persistent protection
        Protects your sensitive information no matter where it is sent
        Usage rights locked within the document itself
        Protects online and offline, inside and outside of the firewall

    Granular control
        Users apply IRM protection directly within an e-mail
        Organizations can create custom usage policy templates such as
         "Confidential—Read Only"
        Limit file access to only authorized users


             Information Rights Management (IRM) provides
                 persistent protection to control who can
          access, forward, print, or copy sensitive data within an
IRM Decryption
Enable scanning, filtering, journaling

                                         Infected messages
                                         and spam can be
Protected messages                       filtered
sent to transport server




                                         Messages are re-
                                         encrypted and
                                         delivered
   Messages and attachments
   decrypted to enable                   Journaled messages
   content filtering, transport          include decrypted
   rules                                 clear-text copy
AD RMS Workflow
Database Server          AD RMS Cluster              Active Directory



                           7


 Publishing                                                  Consuming
                                              8
                     1                    6
              3                                                  9

   2
                               4                                     5



Information Author                                Information Recipient
Configuring AD RMS for
Exchange
    Default Do Not Forward
    Give Exchange servers the ability to access AD
     RMS by setting appropriate permissions on the AD
     RMS certification pipeline
    Give Exchange servers the ability to decrypt
     protected messages and attachments by
     configuring the AD RMS super users group
Step1.
CerverCertification.asmx
Step2. SuperUsers
Step3. InternalLicensing
Step4. Distribute Templates
Send RMS Protected Messages
       There is more:
       • TransportRules
       • Outlook Protection Rules
Receive RMS Protected
Messages
Hybrid = Trusted Publishing
Domains
            MsBelux.Be                    MicrosoftBelux.OnMicrosoft.Com

1. MsBelux.Be                                              2. Office365
exports                                                    imports
private key                                                private key
and SLC                                                    and SLC


                                      5. Office 365     4. Ilse sends PL
                                      uses              and RAC with
                                      imported          request for UL
                                      private key to    from O365
                                      decrypt PL
                                      and issues UL




                         3. Koen sends IRM-
                         Protected message to Ilse
MsBelux.Be   MicrosoftBelux.OnMicrosoft.Com

1. MsBelux.Be
exports
private key
and SLC
Step 2: Office365 Imports
  Private Key and SLC
      MsBelux.Be  MicrosoftBelux.OnMicrosoft.Com

1. MsBelux.Be                      2. Office365
exports                            imports
private key                        private key
and SLC                            and SLC
Step 3: Send a Mail
            MsBelux.Be                    MicrosoftBelux.OnMicrosoft.Com

1. MsBelux.Be                                              2. Office365
exports                                                    imports
private key                                                private key
and SLC                                                    and SLC




                         3. Koen sends IRM-
                         Protected message to Ilse
Step 4 + 5: Read Mail
            MsBelux.Be                    MicrosoftBelux.OnMicrosoft.Com

1. MsBelux.Be                                              2. Office365
exports                                                    imports
private key                                                private key
and SLC                                                    and SLC


                                      5. Office 365     4. Ilse sends PL
                                      uses              and RAC with
                                      imported          request for UL
                                      private key to    from O365
                                      decrypt PL
                                      and issues UL




                         3. Koen sends IRM-
                         Protected message to Ilse
Agenda

   Introduction
   Out of the Box
   Exchange + RMS
   Exchange + SharePoint
   Exchange + Lync
   Lync + SharePoint
   On Premises - Online
Exchange - SharePoint

    My Picture
    Outlook Integration
    Indexing Public Folders
    Web Parts
My Picture
EXCHANGE – SHAREPOINT - LYNC
Lync 2010 and My Picture
   Lync can display photo
       ADDS: thumbnailPhoto (SharePoint/Exchange)
       URL (JPEG & publically readable)
   thumbnailPhoto
       Introduced in Active Directory 2000
       Default size is 100Kb (EMS limits to 10Kb)
       Requires Outlook 2010 and a forest schema extended to the 2008
        version or later
       Replicate to Global Catalog
Lync 2010 and My Picture

    Controlling = CsClientPolicy
      DisplayPhoto
      MaxPhotoSizeKB (default = 30Kb)

    Not stored in GalContacts.db
    Lync uses Address Book Web Query
      PhotoHash
      PhotoRelPath
      PhotoSize

    Cached client side & server side
Lync 2010 and My Picture
Populate Picture

 Using Exchange              Using SharePoint
    Import-                    Upload the user’s picture
     RecipientDataProperty       on ―My Site‖
                                Configure SharePoint
                                 2010 to replicate the
                                 picture from the user
                                 profile to AD
                                Perform the Full User
                                 Profile Synchronization
Outlook integration
EXCHANGE - SHAREPOINT
Outlook Integration
Overview
    Content is downloaded and stored in a PST file
Outlook Integration
Overview
    2-Way Synchronization is supported
    Supported list types
        Calendars
        Contacts
        Tasks
        Alerts
        Document Libraries
        Discussion boards
Indexing?
EXCHANGE - SHAREPOINT
Indexing Public Folders

    SharePoint’s search engine can index (crawl)
     Exchange Public Folders
    Supported in SharePoint Server but not in
     SharePoint Foundation
        Can use Search Server Express 2010 for SPF
    Fast Search can index (crawl) Exchange Public
     Folders as well
Web parts
EXCHANGE - SHAREPOINT
Outlook Web App Web
Parts
    Access OWA content directly from a URL
        Entered in browser
        Embedded in application like SharePoint
    Min. Permissions required = Reviewer
Agenda

   Introduction
   Out of the Box
   Exchange + RMS
   Exchange + SharePoint
   Exchange + Lync
   Lync + SharePoint
   On Premises - Online
Exchange + Lync

    MAPI or EWS
    OWA integration
    UM integration
    Play On Phone
Mapi or ews?
EXCHANGE + LYNC
Exchange and Lync: MAPI
or EWS
Access conversation history and voice mail
   Play back voice mail message
   Display free/busy information and working hours
   Display meeting subject, time, and location
   Display Out of Office status and note
   Exchange contact sync
   Search Outlook personal contacts
Exchange and Lync:
Free/Busy
    Does not require Outlook if EWS is deployed!
Exchange and Lync:
Free/Busy ...
    EWS Not Deployed?
        Verify the InternalURL and ExternalURL for the Web
         Services virtual directory are entered
Exchange and Lync:
Free/Busy ...
    The information discovered by Lync via
     Autodiscover is cached in the registry
Lync Requires Exchange
2010 For
    Presence info in OWA
    Single Contact Store
Owa integration
EXCHANGE + LYNC
Lync 2010 Exchange 2010
OWA
    Install the necessary updates on your Exchange
     Server
    Configure the Exchange 2010 CAS
    Configure Lync 2010
Exchange 2010 Sp2 CAS
Updates?
    Possible: vcredist_x64.exe
    Possible: Office Communications
     Server 2007 R2 Web Service Provider
    Unified Communications API 2.0 Redist
     (64 Bit) Hotfix KB 2400399
    Possible (Win2008R2) Hotfix KB 968802:
     UcmaRedist.msp (!)
Configure Exchange 2010
CAS
    Set-OwaVirtualDirectory:
        InstantMessagingType OCS
        InstantMessagingEnabled $True
        InstantMessagingCertificateThumbPrint
        InstantMessagingServerName
Configure Exchange 2010
CAS




           IISRESET 
Configure Lync

    Topology Builder: New Trusted Application Pool
    Lync Management Shell: New Trusted Application
Control?
Unified messaging
EXCHANGE + LYNC
Lync And Exchange UM

    Exchange UM can service more than Lync Voice
    Lync needs Exchange UM as a Voice Mail
     repository
Configuration

    Create Exchange UM + Lync Dial Plan
    Run Exchange UC Configuration Script
    Run Lync UM Configuration Tool
No UM Integration
Small Note Collocation

    Exchange CAS + UM Collocated
    OWA Integration Configured
    Solution
        Safe to ignore
        Remove the CsTrustedApplication representing
         Exchange OWA (be careful when no longer
         collocating)
Small Note Collocation
Small Note Collocation
Small Note Collocation
Play on phone
EXCHANGE + LYNC
Agenda

   Introduction
   Out of the Box
   Exchange + RMS
   Exchange + SharePoint
   Exchange + Lync
   Lync + SharePoint
   On Premises - Online
Lync and SharePoint

    Skill Search
    Access MySite from Lync – Options
    On a SharePoint Server page, view a user’s Lync
     presence indicator and its associated menu or
     contact card
Skill Search in Lync 2010

    Requires SharePoint 2007 or later with maintained
     MySites
    SharePoint search center URL is provisioned via in-
     band settings
    SharePoint must be published to the internet
    Requires full version of SharePoint (WSS is not
     sufficient)
Lync 2010 SharePoint
Skill Search Process
Skill Search Config
Skill Search Config
Skill Search Config
Skill Search Config
Agenda

   Introduction
   Out of the Box
   Exchange + RMS
   Exchange + SharePoint
   Exchange + Lync
   Lync + SharePoint
   On Premises - Online
Integration Possibilities
                                                                  Exchange Server (on-
                                Exchange Online
                                                                       premises)
                         • Lync client presence integration    • Lync client presence
                         • IM/Presence in OWA                    integration
    Lync Online


                         • Lync client presence integration    • Lync client presence
                         • IM/Presence in OWA                    integration
  Lync Server on-
                         • Exchange Voice mail integration     • IM/Presence in OWA
     premises                                                  • Exchange Voice mail
                                                                 integration
  Presence integration = OOF messages in Lync, calendar-based presence status, embedded
  presence in Outlook and Office


                                                                  SharePoint Server (on-
                                SharePoint Online
                                                                       premises)
                         • Lync client presence integration    • Lync client presence
                                                                 integration
    Lync Online

                         • Lync client presence integration    • Lync client presence
  Lync Server on-                                                integration
                                                               • Skill search in Lync client
     premises

      Presence integration = embedded presence and click-to-communicate in SharePoint sites
Agenda

   Introduction
   Out of the Box
   Exchange + RMS
   Exchange + SharePoint
   Exchange + Lync
   Lync + SharePoint
   On Premises - Online
Ilse Van Criekinge
 • Technology Advisor Core UC
 • Microsoft Belux
       http://blogs.technet.com/ilvancri
       ilvancri@microsoft.com
      @ivcrieki


      Thank You!

Contenu connexe

En vedette

Louise Bourgeois
Louise BourgeoisLouise Bourgeois
Louise Bourgeois
Dax Vorona
 
Monday factors of production
Monday factors of productionMonday factors of production
Monday factors of production
Travis Klein
 
A tribute to_mothers
A tribute to_mothersA tribute to_mothers
A tribute to_mothers
Chandan Dubey
 

En vedette (18)

EMC Greenplum Database version 4.2
EMC Greenplum Database version 4.2 EMC Greenplum Database version 4.2
EMC Greenplum Database version 4.2
 
RSA Cybercrime Statistics : November 2013
RSA Cybercrime Statistics : November 2013RSA Cybercrime Statistics : November 2013
RSA Cybercrime Statistics : November 2013
 
Louise Bourgeois
Louise BourgeoisLouise Bourgeois
Louise Bourgeois
 
Tumanyan
TumanyanTumanyan
Tumanyan
 
Life Sciences at RENCI - Big Data IT to Manage, Decipher, and Inform
Life Sciences at RENCI - Big Data IT to Manage, Decipher, and InformLife Sciences at RENCI - Big Data IT to Manage, Decipher, and Inform
Life Sciences at RENCI - Big Data IT to Manage, Decipher, and Inform
 
Ablation material book
Ablation material   bookAblation material   book
Ablation material book
 
So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.
 
Your Data Center Boundaries Don’t Exist Anymore!
Your Data Center Boundaries Don’t Exist Anymore! Your Data Center Boundaries Don’t Exist Anymore!
Your Data Center Boundaries Don’t Exist Anymore!
 
Finance
FinanceFinance
Finance
 
Monday factors of production
Monday factors of productionMonday factors of production
Monday factors of production
 
私とNFC(歴史編)
私とNFC(歴史編)私とNFC(歴史編)
私とNFC(歴史編)
 
Flash-Specific Data Protection
Flash-Specific Data ProtectionFlash-Specific Data Protection
Flash-Specific Data Protection
 
Why Laurel
Why LaurelWhy Laurel
Why Laurel
 
Configuration Compliance For Storage, Network & Server
Configuration Compliance For Storage, Network & Server Configuration Compliance For Storage, Network & Server
Configuration Compliance For Storage, Network & Server
 
Mi3
Mi3Mi3
Mi3
 
It`s Satya Paul for mandira once again!
It`s Satya Paul for mandira once again!It`s Satya Paul for mandira once again!
It`s Satya Paul for mandira once again!
 
A tribute to_mothers
A tribute to_mothersA tribute to_mothers
A tribute to_mothers
 
50 states
50 states50 states
50 states
 

Similaire à Lync'ing IT all together

Advanticom office 365 and lync presentation
Advanticom office 365 and lync presentationAdvanticom office 365 and lync presentation
Advanticom office 365 and lync presentation
webcreative
 
Summerschool unified communications
Summerschool unified communicationsSummerschool unified communications
Summerschool unified communications
e-office bv
 
Microsoft Unified Communications - Overview Presentation
Microsoft Unified Communications - Overview PresentationMicrosoft Unified Communications - Overview Presentation
Microsoft Unified Communications - Overview Presentation
Microsoft Private Cloud
 
emediaIT - Unified Communications - 2011.09.01
emediaIT - Unified Communications - 2011.09.01emediaIT - Unified Communications - 2011.09.01
emediaIT - Unified Communications - 2011.09.01
Venketash (Pat) Ramadass
 
Exchange 2010 Overview
Exchange 2010 OverviewExchange 2010 Overview
Exchange 2010 Overview
rsnarayanan
 
Ft direct product present v3.1
Ft direct product present v3.1Ft direct product present v3.1
Ft direct product present v3.1
truong14
 
Ft direct product present v3.1
Ft direct product present v3.1Ft direct product present v3.1
Ft direct product present v3.1
truong14
 

Similaire à Lync'ing IT all together (20)

Uc Microsoft Lync
Uc   Microsoft  LyncUc   Microsoft  Lync
Uc Microsoft Lync
 
Advanticom office 365 and lync presentation
Advanticom office 365 and lync presentationAdvanticom office 365 and lync presentation
Advanticom office 365 and lync presentation
 
Summerschool unified communications
Summerschool unified communicationsSummerschool unified communications
Summerschool unified communications
 
Microsoft Unified Communications - Overview Presentation
Microsoft Unified Communications - Overview PresentationMicrosoft Unified Communications - Overview Presentation
Microsoft Unified Communications - Overview Presentation
 
Contemporary Unified Communications and Contact Center: Better Together
Contemporary Unified Communications and Contact Center: Better TogetherContemporary Unified Communications and Contact Center: Better Together
Contemporary Unified Communications and Contact Center: Better Together
 
emediaIT - Unified Communications - 2011.09.01
emediaIT - Unified Communications - 2011.09.01emediaIT - Unified Communications - 2011.09.01
emediaIT - Unified Communications - 2011.09.01
 
Unify² Polycom-Microsoft UCC Portfolio
Unify² Polycom-Microsoft UCC PortfolioUnify² Polycom-Microsoft UCC Portfolio
Unify² Polycom-Microsoft UCC Portfolio
 
Developing a Lync Deployment Plan
Developing a Lync Deployment PlanDeveloping a Lync Deployment Plan
Developing a Lync Deployment Plan
 
SURFnetRelatiedagen Microsoft Online Strategie 15 5 2008 V1.0
SURFnetRelatiedagen   Microsoft Online Strategie   15 5 2008   V1.0SURFnetRelatiedagen   Microsoft Online Strategie   15 5 2008   V1.0
SURFnetRelatiedagen Microsoft Online Strategie 15 5 2008 V1.0
 
Cyber Security in Energy & Utilities Industry
Cyber Security in Energy & Utilities IndustryCyber Security in Energy & Utilities Industry
Cyber Security in Energy & Utilities Industry
 
Wave14 - Exchange 2010 Beta Preview by MVP Poo Ching Loong
Wave14 - Exchange 2010 Beta Preview by MVP Poo Ching LoongWave14 - Exchange 2010 Beta Preview by MVP Poo Ching Loong
Wave14 - Exchange 2010 Beta Preview by MVP Poo Ching Loong
 
Exchange 2010 Overview
Exchange 2010 OverviewExchange 2010 Overview
Exchange 2010 Overview
 
Soa security2
Soa security2Soa security2
Soa security2
 
Iris-Corp's corporate business profile
Iris-Corp's corporate business profileIris-Corp's corporate business profile
Iris-Corp's corporate business profile
 
Ft direct product present v3.1
Ft direct product present v3.1Ft direct product present v3.1
Ft direct product present v3.1
 
Ft direct product present v3.1
Ft direct product present v3.1Ft direct product present v3.1
Ft direct product present v3.1
 
Ucc by hp
Ucc by hpUcc by hp
Ucc by hp
 
20120308 cloud
20120308 cloud20120308 cloud
20120308 cloud
 
Microsoft Exchange Service on Cloud
Microsoft Exchange Service on CloudMicrosoft Exchange Service on Cloud
Microsoft Exchange Service on Cloud
 
Cloud taxonomy yong kigkeat
Cloud taxonomy yong kigkeatCloud taxonomy yong kigkeat
Cloud taxonomy yong kigkeat
 

Plus de Microsoft TechNet - Belgium and Luxembourg

Plus de Microsoft TechNet - Belgium and Luxembourg (20)

Windows 10: all you need to know!
Windows 10: all you need to know!Windows 10: all you need to know!
Windows 10: all you need to know!
 
Configuration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
Configuration Manager 2012 – Compliance Settings 101 - Tim de KeukelaereConfiguration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
Configuration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
 
Windows 8.1 a closer look
Windows 8.1 a closer lookWindows 8.1 a closer look
Windows 8.1 a closer look
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 
Deploying and managing ConfigMgr Clients
Deploying and managing ConfigMgr ClientsDeploying and managing ConfigMgr Clients
Deploying and managing ConfigMgr Clients
 
Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?
Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?
Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?
 
Hands on with Hyper-V Clustering Maintenance Mode & Cluster Aware Updating
Hands on with Hyper-V Clustering Maintenance Mode & Cluster Aware UpdatingHands on with Hyper-V Clustering Maintenance Mode & Cluster Aware Updating
Hands on with Hyper-V Clustering Maintenance Mode & Cluster Aware Updating
 
SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012
 
Jump start your application monitoring with APM
Jump start your application monitoring with APMJump start your application monitoring with APM
Jump start your application monitoring with APM
 
What’s new in Lync Server 2013: Persistent Chat
What’s new in Lync Server 2013: Persistent ChatWhat’s new in Lync Server 2013: Persistent Chat
What’s new in Lync Server 2013: Persistent Chat
 
What's new for Lync 2013 Clients & Devices
What's new for Lync 2013 Clients & DevicesWhat's new for Lync 2013 Clients & Devices
What's new for Lync 2013 Clients & Devices
 
Office 365 ProPlus: Click-to-run deployment and management
Office 365 ProPlus: Click-to-run deployment and managementOffice 365 ProPlus: Click-to-run deployment and management
Office 365 ProPlus: Click-to-run deployment and management
 
Office 365 Identity Management options
Office 365 Identity Management options Office 365 Identity Management options
Office 365 Identity Management options
 
SharePoint Installation and Upgrade: Untangling Your Options
SharePoint Installation and Upgrade: Untangling Your Options SharePoint Installation and Upgrade: Untangling Your Options
SharePoint Installation and Upgrade: Untangling Your Options
 
The application model in real life
The application model in real lifeThe application model in real life
The application model in real life
 
Microsoft private cloud with Cisco and Netapp - Flexpod solution
Microsoft private cloud with Cisco and Netapp -  Flexpod solutionMicrosoft private cloud with Cisco and Netapp -  Flexpod solution
Microsoft private cloud with Cisco and Netapp - Flexpod solution
 
Managing Windows RT devices in the Enterprise
Managing Windows RT devices in the Enterprise Managing Windows RT devices in the Enterprise
Managing Windows RT devices in the Enterprise
 
Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management
 
Network Management in System Center 2012 SP1 - VMM
Network Management in System Center 2012  SP1 - VMM Network Management in System Center 2012  SP1 - VMM
Network Management in System Center 2012 SP1 - VMM
 
Hackers (Not) Halted
Hackers (Not) Halted Hackers (Not) Halted
Hackers (Not) Halted
 

Dernier

Dernier (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

Lync'ing IT all together

  • 1. Unified Communications and Collaboration: Lync’ing IT All Together IlseVan Criekinge Office365 Technology Advisor Microsoft BeLux
  • 2. Ilse Van Criekinge • Technology Advisor Core UC • Microsoft Belux http://blogs.technet.com/ilvancri ilvancri@microsoft.com @ivcrieki
  • 3. Agenda  Introduction  Out of the Box  Exchange + RMS  Exchange + SharePoint  Exchange + Lync  Lync + SharePoint  On Premises - Online
  • 4. Future of Communications Communications Today Instant Video Web E-mail and Audio Messaging (IM) Voice Mail Conferencing Telephony Conferencing Calendaring Conferencing Telephony Instant Unified Messaging and Voice Mail E-mail and Conferencing: Calendaring Audio, Video, Web Authenticatio Authenticatio Authenticatio Authenticatio n n n n Administratio Administratio Administratio Administratio n n n n Storage Storage Storage Authentication Storage Authentication Authentication Authentication Administration Administration Administration Storage Administration Storage Storage Storage Compliance On-Premises Hybrid In the Cloud
  • 5. Agenda  Introduction  Out of the Box  Exchange + RMS  Exchange + SharePoint  Exchange + Lync  Lync + SharePoint  On Premises - Online
  • 6. Setting the Scene  DC01 = Windows 2008 R2  EX01 = Windows 2008 R2 + Exchange 2010 Sp2  LYNC01 = Lync 2010  SP01 = SharePoint 2010
  • 7. Out Of The Box  Presence integration = embedded presence and click-to- communicate in SharePoint sites
  • 8. Out Of The Box, But...  Users must have Office 2010, Office 2007, or Microsoft Office 2003 with the latest service pack installed to view extended presence information on a SharePoint Server page!  The name.dll file is an ActiveX® control that calls the Lync API directly to request and display presence status within SharePoint site collections.
  • 9. Agenda  Introduction  Out of the Box  Exchange + RMS  Exchange + SharePoint  Exchange + Lync  Lync + SharePoint  On Premises - Online
  • 10. Information Protection and Control Exchange Server 2010 helps prevent the unauthorized transmission of sensitive information with tools that can automatically:  MONITOR e-mail for specific content, recipients and other attributes  CONTROL distribution with automated, granular polices  PROTECT access to data wherever it travels using rights management  PREVENT  Violations of corporate policy and best practices  Non-compliance with government and industry regulations  Loss of intellectual property and proprietary information  High-profile leaks of private information and customer records  Damage to corporate brand image and reputation
  • 11. Benefits of Automated Controls Reduce User Error • Majority of data loss incidents are accidental • Users forget policies or apply incorrect policy Enable More Consistent Policy • Automation facilitates rapid policy changes across the organization • Critical for internal/external governance and compliance Improve Efficiency • Offload complex data polices from users • Enable centralized policy creation, execution and management
  • 12. Benefits of Granular Controls Mailtips Transport Rules (Exchange/FOPE/EHE) Alert Modify Protect Redirect ―Allow delivery ―Allow ―Allow ―Block but add a delivery delivery but delivery warning.‖ but modify prevent and message.‖ forwarding.‖ redirect.‖ LESS RESTRICTIVE MORE RESTRICTIVE Classify Append Review Block ―Allow ―Allow ―Block ―Do not delivery but delivery but delivery deliver.‖ apply add a until classification.‖ disclaimer.‖ reviewed.‖ Message Transport Moderated Transport Classification Rules Mailbox Rules
  • 13. Information Rights Management  Persistent protection  Protects your sensitive information no matter where it is sent  Usage rights locked within the document itself  Protects online and offline, inside and outside of the firewall  Granular control  Users apply IRM protection directly within an e-mail  Organizations can create custom usage policy templates such as "Confidential—Read Only"  Limit file access to only authorized users Information Rights Management (IRM) provides persistent protection to control who can access, forward, print, or copy sensitive data within an
  • 14. IRM Decryption Enable scanning, filtering, journaling Infected messages and spam can be Protected messages filtered sent to transport server Messages are re- encrypted and delivered Messages and attachments decrypted to enable Journaled messages content filtering, transport include decrypted rules clear-text copy
  • 15. AD RMS Workflow Database Server AD RMS Cluster Active Directory 7 Publishing Consuming 8 1 6 3 9 2 4 5 Information Author Information Recipient
  • 16. Configuring AD RMS for Exchange  Default Do Not Forward  Give Exchange servers the ability to access AD RMS by setting appropriate permissions on the AD RMS certification pipeline  Give Exchange servers the ability to decrypt protected messages and attachments by configuring the AD RMS super users group
  • 18.
  • 20.
  • 21.
  • 23.
  • 25. Send RMS Protected Messages There is more: • TransportRules • Outlook Protection Rules
  • 27. Hybrid = Trusted Publishing Domains MsBelux.Be MicrosoftBelux.OnMicrosoft.Com 1. MsBelux.Be 2. Office365 exports imports private key private key and SLC and SLC 5. Office 365 4. Ilse sends PL uses and RAC with imported request for UL private key to from O365 decrypt PL and issues UL 3. Koen sends IRM- Protected message to Ilse
  • 28. MsBelux.Be MicrosoftBelux.OnMicrosoft.Com 1. MsBelux.Be exports private key and SLC
  • 29.
  • 30.
  • 31.
  • 32. Step 2: Office365 Imports Private Key and SLC MsBelux.Be MicrosoftBelux.OnMicrosoft.Com 1. MsBelux.Be 2. Office365 exports imports private key private key and SLC and SLC
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39. Step 3: Send a Mail MsBelux.Be MicrosoftBelux.OnMicrosoft.Com 1. MsBelux.Be 2. Office365 exports imports private key private key and SLC and SLC 3. Koen sends IRM- Protected message to Ilse
  • 40.
  • 41. Step 4 + 5: Read Mail MsBelux.Be MicrosoftBelux.OnMicrosoft.Com 1. MsBelux.Be 2. Office365 exports imports private key private key and SLC and SLC 5. Office 365 4. Ilse sends PL uses and RAC with imported request for UL private key to from O365 decrypt PL and issues UL 3. Koen sends IRM- Protected message to Ilse
  • 42.
  • 43. Agenda  Introduction  Out of the Box  Exchange + RMS  Exchange + SharePoint  Exchange + Lync  Lync + SharePoint  On Premises - Online
  • 44. Exchange - SharePoint  My Picture  Outlook Integration  Indexing Public Folders  Web Parts
  • 45. My Picture EXCHANGE – SHAREPOINT - LYNC
  • 46. Lync 2010 and My Picture  Lync can display photo  ADDS: thumbnailPhoto (SharePoint/Exchange)  URL (JPEG & publically readable)  thumbnailPhoto  Introduced in Active Directory 2000  Default size is 100Kb (EMS limits to 10Kb)  Requires Outlook 2010 and a forest schema extended to the 2008 version or later  Replicate to Global Catalog
  • 47. Lync 2010 and My Picture  Controlling = CsClientPolicy  DisplayPhoto  MaxPhotoSizeKB (default = 30Kb)  Not stored in GalContacts.db  Lync uses Address Book Web Query  PhotoHash  PhotoRelPath  PhotoSize  Cached client side & server side
  • 48. Lync 2010 and My Picture
  • 49. Populate Picture Using Exchange Using SharePoint  Import-  Upload the user’s picture RecipientDataProperty on ―My Site‖  Configure SharePoint 2010 to replicate the picture from the user profile to AD  Perform the Full User Profile Synchronization
  • 51. Outlook Integration Overview  Content is downloaded and stored in a PST file
  • 52. Outlook Integration Overview  2-Way Synchronization is supported  Supported list types  Calendars  Contacts  Tasks  Alerts  Document Libraries  Discussion boards
  • 54. Indexing Public Folders  SharePoint’s search engine can index (crawl) Exchange Public Folders  Supported in SharePoint Server but not in SharePoint Foundation  Can use Search Server Express 2010 for SPF  Fast Search can index (crawl) Exchange Public Folders as well
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60. Web parts EXCHANGE - SHAREPOINT
  • 61. Outlook Web App Web Parts  Access OWA content directly from a URL  Entered in browser  Embedded in application like SharePoint  Min. Permissions required = Reviewer
  • 62. Agenda  Introduction  Out of the Box  Exchange + RMS  Exchange + SharePoint  Exchange + Lync  Lync + SharePoint  On Premises - Online
  • 63. Exchange + Lync  MAPI or EWS  OWA integration  UM integration  Play On Phone
  • 65. Exchange and Lync: MAPI or EWS Access conversation history and voice mail  Play back voice mail message  Display free/busy information and working hours  Display meeting subject, time, and location  Display Out of Office status and note  Exchange contact sync  Search Outlook personal contacts
  • 66. Exchange and Lync: Free/Busy  Does not require Outlook if EWS is deployed!
  • 67. Exchange and Lync: Free/Busy ...  EWS Not Deployed?  Verify the InternalURL and ExternalURL for the Web Services virtual directory are entered
  • 68. Exchange and Lync: Free/Busy ...  The information discovered by Lync via Autodiscover is cached in the registry
  • 69.
  • 70.
  • 71. Lync Requires Exchange 2010 For  Presence info in OWA  Single Contact Store
  • 73. Lync 2010 Exchange 2010 OWA  Install the necessary updates on your Exchange Server  Configure the Exchange 2010 CAS  Configure Lync 2010
  • 74.
  • 75. Exchange 2010 Sp2 CAS Updates?  Possible: vcredist_x64.exe  Possible: Office Communications Server 2007 R2 Web Service Provider  Unified Communications API 2.0 Redist (64 Bit) Hotfix KB 2400399  Possible (Win2008R2) Hotfix KB 968802: UcmaRedist.msp (!)
  • 76. Configure Exchange 2010 CAS  Set-OwaVirtualDirectory:  InstantMessagingType OCS  InstantMessagingEnabled $True  InstantMessagingCertificateThumbPrint  InstantMessagingServerName
  • 78. Configure Lync  Topology Builder: New Trusted Application Pool  Lync Management Shell: New Trusted Application
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.
  • 87.
  • 90. Lync And Exchange UM  Exchange UM can service more than Lync Voice  Lync needs Exchange UM as a Voice Mail repository
  • 91. Configuration  Create Exchange UM + Lync Dial Plan  Run Exchange UC Configuration Script  Run Lync UM Configuration Tool
  • 93.
  • 94.
  • 95.
  • 96.
  • 97.
  • 98.
  • 99.
  • 100.
  • 101.
  • 102.
  • 103.
  • 104.
  • 105.
  • 106.
  • 107.
  • 108.
  • 109.
  • 110.
  • 111.
  • 112.
  • 113.
  • 114.
  • 115.
  • 116.
  • 117.
  • 118. Small Note Collocation  Exchange CAS + UM Collocated  OWA Integration Configured  Solution  Safe to ignore  Remove the CsTrustedApplication representing Exchange OWA (be careful when no longer collocating)
  • 123.
  • 124.
  • 125.
  • 126.
  • 127.
  • 128.
  • 129.
  • 130.
  • 131.
  • 132.
  • 133. Agenda  Introduction  Out of the Box  Exchange + RMS  Exchange + SharePoint  Exchange + Lync  Lync + SharePoint  On Premises - Online
  • 134. Lync and SharePoint  Skill Search  Access MySite from Lync – Options  On a SharePoint Server page, view a user’s Lync presence indicator and its associated menu or contact card
  • 135. Skill Search in Lync 2010  Requires SharePoint 2007 or later with maintained MySites  SharePoint search center URL is provisioned via in- band settings  SharePoint must be published to the internet  Requires full version of SharePoint (WSS is not sufficient)
  • 136. Lync 2010 SharePoint Skill Search Process
  • 141. Agenda  Introduction  Out of the Box  Exchange + RMS  Exchange + SharePoint  Exchange + Lync  Lync + SharePoint  On Premises - Online
  • 142.
  • 143. Integration Possibilities Exchange Server (on- Exchange Online premises) • Lync client presence integration • Lync client presence • IM/Presence in OWA integration Lync Online • Lync client presence integration • Lync client presence • IM/Presence in OWA integration Lync Server on- • Exchange Voice mail integration • IM/Presence in OWA premises • Exchange Voice mail integration Presence integration = OOF messages in Lync, calendar-based presence status, embedded presence in Outlook and Office SharePoint Server (on- SharePoint Online premises) • Lync client presence integration • Lync client presence integration Lync Online • Lync client presence integration • Lync client presence Lync Server on- integration • Skill search in Lync client premises Presence integration = embedded presence and click-to-communicate in SharePoint sites
  • 144. Agenda  Introduction  Out of the Box  Exchange + RMS  Exchange + SharePoint  Exchange + Lync  Lync + SharePoint  On Premises - Online
  • 145. Ilse Van Criekinge • Technology Advisor Core UC • Microsoft Belux http://blogs.technet.com/ilvancri ilvancri@microsoft.com @ivcrieki Thank You!

Notes de l'éditeur

  1. SharePoint Presence InternalsSharePoint presence status is displayed through a client-side setting by using a dynamic link library called name.dll. This file is installed with Microsoft Office 2010. Office 2007, and Office 2003 and is located in the Office installation directory (C:\\Program Files\\Microsoft Office\\Office 14). The name.dll file is an ActiveX® control that calls the Lync API directly to request and display presence status within SharePoint site collections. Presence is enabled in SharePoint by default; there are no configuration steps for the SharePoint administrator to perform. Each SharePoint page includes Microsoft JScript® code, which enables presence for that site. JScript uses name.dll to call the Lync API and pull presence for users names who appear on the site. JScript uses the users’ SIP URI to pull presence for names that are listed on the site. The following JScript code is an example of presence being pulled for a user named Bob Kelly, whose SIP URI is bobkelly@contoso.net. The SIP URI is added by using variables to the JScript when the script is loaded and presence is being pulled. <a href='jscript:;' onclick='IMNImageOnClick(event);return false;' class='ms-imnlink'><img name='imnmark' class='ms-imnImg' title='' border='0' height='12' width='12' src='/_layouts/images/blank.gif' alt='No presence information' sip='bobkelly@contoso.net' id='imn_74,type=smtp'/></a><a onclick="GoToLink(this);return false;" </a>
  2. SituationJust as IRM protection can impede search, it can also breaks essential parts of organizational infrastructure such as Transport rules,antivirus and anti-spam scanning and indexing and searching of journaled messages. Slide objectiveDiscuss benefits of IRM decryption agent and how it can enable essential systems to process protected messages. Talking points[BUILD 1]IRM-protected messages are sent to transport server [BUILD 2]IRM decryption in Exchange 2010 enables organizations to grant Transport Agents content access rights to the messages protected against their own RMS servers.This enables Transport Agents to perform actions such as content filtering and application of transport rules Transport decryption will decrypt both the message and the supported attachments(MS Office 2003, 2007 and 14) as long as attachments were protected along with the message.[BUILD 3]Messages are then re-encrypted and deliveredInfected messages/spam can be filtered IRM Decryption can also be used with journaling to ensure that journal reports sent to journal mailboxes or third-party archives will contain a decrypted (clear-text) copy of IRM-protected messages. This allows for indexing and searching of IRM-protected messages for legal discovery and regulatory purposes.
  3. Lync 2010 queries Lync Server 2010 by using the Address Book Web Query (ABWQ) to retrieve photos. The queries include three attributes:PhotoHash contains a hashed value of the photo binary data and is used to determine if the current photo has changed. PhotoRelPath contains the relative path to the actual photo stored on the server. PhotoSize is the size of the photo in bytes.Lync 2010 then checks the PhotoSize returned against the MaxPhotoSizeKB it obtained from in-band provisioning. If the PhotoSize multiplied by 1024 is less or equal to MaxPhotoSizeKB, the client will retrieve the photo by using an HTTP GET request using the URL https://<absInternalServerUrl>"/"<PhotoRelPath> or https://<absExternalServerUrl>"/"<PhotoRelPath>, where the base URLs, https://<absInternalServerUrl> and https://<absExternalUrl>, are obtained through in-band provisioning.The client then caches the photo of the signed-in user locally. It also stores the PhotoRelPath, PhotoSize, and PhotoHash in the cached Address Book Service (ABS) entry for the user. It also stores a timestamp that indicates when the photo was downloaded from the Lync Server. This cached data is located in %userprofile%\\AppData\\Local\\Microsoft\\Communicator\\sip_<SIP URI>\\ABS_<SIP URI>.cache.To avoid downloading the photo every time, Lync uses the photo from its cache. After 24 hours from the time Lync caches the photo, the client sends a request to the server to find out whether the photo has changed by comparing the PhotoHash value sent by the server to its local value. If the photo has changed, Lync updates its cache with the new photo and resets the timestamp.
  4. On the server side, the Address Book Service (ABS) is responsible for handling photos. The component responsible for this functionality is in ABWQ and is exposed through the Distribution List Expansion (DLX) web service. The server uses a cache to limit the load on the Active Directory global catalog servers when requesting photos read from the thumbnailPhoto attribute.When the ABS receives a request for a photo from a client, it first checks if it already has the photo in its cache. The photos are cached in the same folder as the address book files, <Lync Server filestore>\\<WebServer Service Id>\\ABFiles\\<GUID>\\<GUID>. It is the folder with all zeroes in the GUID. The photos are stored as individual files with filenames in the format: <ContactId>.<PhotoHash>.photo (see Figure 2).The client sends the ContactId and the PhotoHash value of the photo in the search request to the server. If this PhotoHash value matches the hash value in the filename, <ContactId>.<PhotoHash>.photo, ABS returns the PhotoRelPath value to the file, <ContactId>.<PhotoHash>.photo, because the picture hasn't changed.If this PhotoHash value does not match the hash value in the corresponding filename or the photo has not yet been cached, the ABS will get the photo from the local Active Directory global catalog. ABS then computes the hash, stores the photo in the cache, and returns the values of PhotoHash, PhotoRelPath, and PhotoSize to the client.ABS deletes all cached photos in the nightly maintenance window. Check event 21056 in the event log and look for "Number of cached photos deleted". This means that it can take up to 24 hours before changed photos appear in the photo cache. To expedite this process you can delete the cached photo for the given user or issue the PowerShell command Update-CsAddressBook.Photos Referenced in Presence InformationThe presence information about a photo also contains as hash value. Lync 2010 uses that hash value to determine if it needs to get a new photo for a given user. If the hash value is the same and the photo is stored in the cache, it Lync 2010 use the cached version. If the hash value is different than the stored one, it will fetch a new photo.The difference between a photo referenced in presence information and photo stored in Active Directory is that Lync 2010 is automatically notified of changes to the photo configuration through the presence information.
  5. Note OAB?
  6. Outlook Live: Type = MSN
  7. http://blogs.technet.com/b/daveh/archive/2010/03/09/expected-outdialing-behavior-for-play-on-phone-scenarios-in-microsoft-exchange-unified-messaging.aspx