1 © 2004, Cisco Systems, Inc. All rights reserved. CISCO CONFIDENTIAL Using Internet Explorer 7.0 to Access Cisco Unity 5.0(1) Web Interfaces Unity 5.0(1)

Slides:



Advertisements
Similar presentations
WEB AND WIRELESS AUTOMATION connecting people and processes InduSoft Web Solution Welcome.
Advertisements

Configuring Windows to run Dr.Web scanner remotely.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy’s National Nuclear.
Configuring Windows Internet Explorer 7 Security Lesson 5.
15.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 15: Configuring a Windows.
NetAcumen ActiveX Download Instructions
Windows Vista Security model and vulnerabilities.
OAAIS Enterprise Information Security Security Awareness, Training & Education (SATE) Program or UCSF Campus VPN.
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
The New Internet Explorer 7 By Ronald Pastor. Overview  Makes everyday web surfing easier –Internet Explorer 7 provides improved navigation through tabbed.
1 of 3 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
Maintaining and Updating Windows Server 2008
Module 6: Patches and Security Updates 1. Overview Installing Patches and Security Updates Recent patches and security updates for IIS Recent patches.
Internet Explorer 7 Security Features Steve Lamb Technical Security Microsoft Ltd
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Guide to MCSE , Enhanced 1 Activity 10-1: Restarting Windows Server 2003 Objective: to restart Windows Server 2003 Start  Shut Down  Restart Configure.
11-01: Get Started with SCP Supply Chain Platform Training Presentation Updated April 2009.
Microsoft ® Official Course Module 9 Configuring Applications.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
August 25, SSO with Microsoft Active Directory Presented by: Craig Larrabee.
Test Review. What is the main advantage to using shadow copies?
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
WINDOWS 10 What’s New? What’s Different?. Who Are We? Cody Pierson Marketing Manager Prophet Business Group Tim Robinson IT Manager Prophet Business Group.
Chapter 14: Remote Server Administration BAI617. Chapter Topics Configure Windows Server 2008 R2 servers for remote administration Remotely connect to.
Remote Desktop Services Remote Desktop Connection Remote Desktop Protocol Remote Assistance Remote Server Administration T0ols.
Networking Security Chapter 8 powered by dj. Chapter Objectives  Explain various security threats  Monitor security in Windows Vista  Explain basic.
Computers Are Your Future Eleventh Edition Chapter 4: System Software Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Hands-On Microsoft Windows Server 2003 Administration Chapter 2 Managing Windows Server 2003 Hardware and Software.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
Troubleshooting Windows Vista Security Chapter 4.
Module 14: Configuring Server Security Compliance
Network Management Tool Amy Auburger. 2 Product Overview Made by Ipswitch Affordable alternative to expensive & complicated Network Management Systems.
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
EMerge Browser Managed Security Platform Module 3: Startup eMerge Certification Course  Physical connection  TCP/IP Characteristics of PC  Initial connection.
INSTALLATION HANDS-ON. Page 2 About the Hands-On This hands-on section is structured in a way, that it allows you to work independently, but still giving.
C HAPTER 2 Introduction to Windows XP Professional.
1 © 2004, Cisco Systems, Inc. All rights reserved. CISCO CONFIDENTIAL Support for Vista Unity 5.0(1)
Module 5: Configuring Internet Explorer and Supporting Applications.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Turning Windows 7 into a Web Server Ch 28. Understanding Internet Information Services.
WINDOWS 8.1 WINDOWS 8.1 RT INTERNET EXPLORER 11 Is this the time for me?
XP Browser and Basics COM111 Introduction to Computer Applications.
Module 5 : Security I Jong S. Bok
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
Windows Vista Inside Out Ch 3: Personalizing Windows Vista Last modified am.
Lesson 6: Controlling Access to Local Hardware and Applications
Windows Administration How to protect your computer.
Internet Explorer 7 Updated Advice for the NHS 04 February 2008 Version 1.3.
Return to the PC Security web page Lesson 4: Increasing Web Browser Security.
Internet Searching the World Wide Web. The Internet and the World Wide Web The Internet is a worldwide collection of networks that allows people to communicate.
ITMT Windows 7 Configuration Chapter 7 – Working with Applications.
Troubleshooting Windows Vista Lesson 11. Skills Matrix Technology SkillObjective DomainObjective # Troubleshooting Installation and Startup Issues Troubleshoot.
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
1 E-Site - FTP Services Setup / install guide. 2 About FTP services can run on any desired port(s) Runs as a windows service Works for all sites installed.
1 © 2004, Cisco Systems, Inc. All rights reserved. CISCO CONFIDENTIAL Private Secure Messaging Unity 4.0(5)
Windows Tutorial 5 Protecting Your Computer
Chapter 1 Objectives Understand the History of Windows Over the Last 20-Plus Years. Compare and Contrast the Available Editions of Windows 7. Understand.
How to Install Norton Antivirus in your Computer
HARDENING CLIENT COMPUTERS
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Windows Vista Inside Out
Introducing Windows Operating Systems
Chapter 9: Configuring Internet Explorer
Implementing Advanced Server and Client Security
Presentation transcript:

1 © 2004, Cisco Systems, Inc. All rights reserved. CISCO CONFIDENTIAL Using Internet Explorer 7.0 to Access Cisco Unity 5.0(1) Web Interfaces Unity 5.0(1)

2 © 2004, Cisco Systems, Inc. All rights reserved. CISCO CONFIDENTIAL Background Microsoft has released Internet Explorer 7 for the following Windows systems: Windows XP with Service Pack 2 Windows 64-bit Client/Server Windows XP Pro x64 Edition Windows Server 2003 x64 Edition Windows Server 2003 with Service Pack 1 or Service Pack 2 Windows Server 2003 IA64 Windows Vista IE 7 has some improvements, including dynamic security, that help defend against malicious software. When run on Windows Vista, IE 7 has a new feature called “Protected mode.” Building on the User Account Control initiative of Vista, IE 7 gives users enough privileges to browse the Web, but not enough to modify user files or settings. By default, IE 7 Protected Mode is enabled for all zones except trusted sites.

3 © 2004, Cisco Systems, Inc. All rights reserved. CISCO CONFIDENTIAL Problem & Solution Problem When IE 7 runs on Windows Vista with protected mode enabled (as it is by default for all zones except trusted sites), the limits on privileges prevent some Cisco Personal Communications Assistant (CPCA) operations from working. Solution If users will be accessing CPCA using IE 7 running on Vista, they need to disable protected mode and add the URL of the Cisco Unity server to the list of trusted sites so CPCA will function properly.

4 © 2004, Cisco Systems, Inc. All rights reserved. CISCO CONFIDENTIAL Implementation Basics When you log on to CPCA using IE 7 running on Vista, CPCA now verifies that protected mode has been disabled and that the CPCA URL has been added to the list of trusted sites. If protected mode has not been disabled or if the CPCA URL has not been added to the list of trusted sites, the following page appears, and CPCA logon fails.

5 © 2004, Cisco Systems, Inc. All rights reserved. CISCO CONFIDENTIAL Implementation Basics (continue) To fix the problem, use the steps included in the screen to add Unity server site to the Trusted sites. Once added, do a screen fresh and a new IE 7 should be started with status bar showing “Trusted sites | Protected Mode: Off”.

6 © 2004, Cisco Systems, Inc. All rights reserved. CISCO CONFIDENTIAL Q & A Can the user install earlier versions of IE on Vista? No. When using IE 7 on other Windows systems such as Windows XP with Service Pack 2 and Windows Server 2003, does the user need to do anything so that CPCA will work properly? No. When using Firefox or Netscape on Vista, does the user need to do anything so that CPCA will work properly? No. Protected Mode is a feature only in IE7 running on Vista. Have we qualified IE 7 on Vista and Windows XP (sp2) for CPCA? Not yet. It is on the list to be done.

7 © 2004, Cisco Systems, Inc. All rights reserved. CISCO CONFIDENTIAL