Solved

Office 2007 Communicator R2

Posted on 2010-09-08
4
257 Views
Last Modified: 2012-05-10
Do I need to have a "server" running OCS for this to function, or can it be setup directly on a laptop to run stand alone?

If I need a server, does it need to be a standalone server with just this on or can it be installed upon an existing server?

Thanks
0
Comment
Question by:smd333
4 Comments
 
LVL 14

Assisted Solution

by:athomsfere
athomsfere earned 100 total points
Comment Utility
It does require the server, it is not a client to client IM.

You should be able to put it on another server, either via VM or just as a secondary program.
0
 

Author Comment

by:smd333
Comment Utility
OK - is it best ran from the Domain controller for certificate purposes?
How does it work externally - ie do I need to open ports in the firewall etc?
Thanks
0
 
LVL 3

Accepted Solution

by:
bobalob earned 200 total points
Comment Utility
So long as your certificate authority is trusted on all of your clients (typically if domain attached, it will be), you shouldn't have any issues on that front.

You will need to ensure a Fully Qualified Domain Name (FQDN) is configured so the clients can connect back whether internally or externally, e.g. "ocs.yourcompany.com"

It's worth reading the Communications Server Guide over at TN: http://technet.microsoft.com/en-us/library/bb870391(office.12).aspx - step 4 contains valuable information on the prerequisites.

0
 
LVL 10

Assisted Solution

by:duffman76
duffman76 earned 200 total points
Comment Utility
You would probably want to run separate servers if you plan for external access.  You would not want people connecting to your domain controller from externally.  Also you would need to have a front end server and then then an Edge server.  You would have to have an external cert created as well for the external clients.  If you are doing internal only you can create everything off of your local ca.  

http://www.ocspedia.com/Edge_Srvr.htm

0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Recently Microsoft released a brand new function called CONCAT. It's supposed to replace its predecessor CONCATENATE. But how does it work? And what's new? In this article, we take a closer look at all of this - we even included an exercise file for…
New Windows 7 Installations take days for Windows-Updates to show up and install. This can easily be fixed. I have finally decided to write an article because this seems to get asked several times a day lately. This Article and the Links apply to…
This tutorial will walk an individual through setting the global and backup job media overwrite and protection periods in Backup Exec 2012. Log onto the Backup Exec Central Administration Server. Examine the services. If all or most of them are stop…
The viewer will learn how to use a discrete random variable to simulate the return on an investment over a period of years, create a Monte Carlo simulation using the discrete random variable, and create a graph to represent the possible returns over…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now