Mastering: Microsoft® Lync™ Server 2010

Book description

An in-depth guide on the leading Unified Communications platform

Microsoft Lync Server 2010 maximizes communication capabilities in the workplace like no other Unified Communications (UC) solution. Written by experts who know Lync Server inside and out, this comprehensive guide shows you step by step how to administer the newest and most robust version of Lync Server. Along with clear and detailed instructions, learning is aided by exercise problems and real-world examples of established Lync Server environments. You'll gain the skills you need to effectively deploy Lync Server 2010 and be on your way to gaining all the benefits UC has to offer.

  • Gets you up and running with Lync Server—whether you are migrating from Office Communications Server or new to Lync Server.

  • Walks you through all of the essential stages for deploying Lync Server

  • Shows integration with Microsoft Exchange Server and Microsoft SharePoint Server

  • Demonstrates how to monitor, diagnose, and troubleshoot problems more efficiently

Mastering Lync Server 2010 is a must-have resource for anyone looking to manage all the various forms of communication from one user interface.

Table of contents

  1. Mastering: Microsoft® Lync™ Server 2010
    1. Copyright
    2. Dedication
    3. Acknowledgments
    4. About the Authors
    5. Contents
    6. Introduction
      1. What You Need to Run Lync Server 2010
      2. What’s Inside
      3. The Mastering Series
      4. Conventions Used in This Book
      5. How to Contact the Authors
    7. Part 1: Fundamentals
      1. Chapter 1: What’s in Lync? (1/6)
      2. Chapter 1: What’s in Lync? (2/6)
      3. Chapter 1: What’s in Lync? (3/6)
      4. Chapter 1: What’s in Lync? (4/6)
      5. Chapter 1: What’s in Lync? (5/6)
      6. Chapter 1: What’s in Lync? (6/6)
        1. Understanding the Lync 2010 Client
        2. Understanding Lync Server 2010
        3. Understanding the Voice Capabilities
        4. Understanding the Unified Communications Managed API Capabilities
        5. The Bottom Line
      7. Chapter 2: Standards and Protocols (1/6)
      8. Chapter 2: Standards and Protocols (2/6)
      9. Chapter 2: Standards and Protocols (3/6)
      10. Chapter 2: Standards and Protocols (4/6)
      11. Chapter 2: Standards and Protocols (5/6)
      12. Chapter 2: Standards and Protocols (6/6)
        1. Understanding SIP’s Origins
        2. The Session Initiation Protocol in Depth
        3. The Bottom Line
      13. Chapter 3: Security (1/7)
      14. Chapter 3: Security (2/7)
      15. Chapter 3: Security (3/7)
      16. Chapter 3: Security (4/7)
      17. Chapter 3: Security (5/7)
      18. Chapter 3: Security (6/7)
      19. Chapter 3: Security (7/7)
        1. Securing External Access
        2. Understanding Core Security
        3. Providing Security Administratively
        4. The Bottom Line
      20. Chapter 4: Clients (1/6)
      21. Chapter 4: Clients (2/6)
      22. Chapter 4: Clients (3/6)
      23. Chapter 4: Clients (4/6)
      24. Chapter 4: Clients (5/6)
      25. Chapter 4: Clients (6/6)
        1. Lync User Clients
        2. Lync Conferencing Clients
        3. Legacy Clients
        4. The Bottom Line
    8. Part 2: Getting Lync Up and Running
      1. Chapter 5: Planning Your Deployment (1/9)
      2. Chapter 5: Planning Your Deployment (2/9)
      3. Chapter 5: Planning Your Deployment (3/9)
      4. Chapter 5: Planning Your Deployment (4/9)
      5. Chapter 5: Planning Your Deployment (5/9)
      6. Chapter 5: Planning Your Deployment (6/9)
      7. Chapter 5: Planning Your Deployment (7/9)
      8. Chapter 5: Planning Your Deployment (8/9)
      9. Chapter 5: Planning Your Deployment (9/9)
        1. Capturing the Requirements
        2. Using the Capacity Planning Toolset
        3. Using Topology Builder
        4. Installation Prerequisites
        5. The Bottom Line
      10. Chapter 6: Installation (1/12)
      11. Chapter 6: Installation (2/12)
      12. Chapter 6: Installation (3/12)
      13. Chapter 6: Installation (4/12)
      14. Chapter 6: Installation (5/12)
      15. Chapter 6: Installation (6/12)
      16. Chapter 6: Installation (7/12)
      17. Chapter 6: Installation (8/12)
      18. Chapter 6: Installation (9/12)
      19. Chapter 6: Installation (10/12)
      20. Chapter 6: Installation (11/12)
      21. Chapter 6: Installation (12/12)
        1. Getting Up and Running with Standard Edition
        2. Post-Deployment Tasks
        3. Configuring External Access
        4. Enterprise Deployments
        5. The Bottom Line
      22. Chapter 7: Migration and Upgrades (1/8)
      23. Chapter 7: Migration and Upgrades (2/8)
      24. Chapter 7: Migration and Upgrades (3/8)
      25. Chapter 7: Migration and Upgrades (4/8)
      26. Chapter 7: Migration and Upgrades (5/8)
      27. Chapter 7: Migration and Upgrades (6/8)
      28. Chapter 7: Migration and Upgrades (7/8)
      29. Chapter 7: Migration and Upgrades (8/8)
        1. Understanding Migration
        2. Considering Client Pain Points
        3. Migrating to Lync
        4. The Bottom Line
    9. Part 3: Administration
      1. Chapter 8: Introduction to PowerShell and the Lync Management Shell (1/8)
      2. Chapter 8: Introduction to PowerShell and the Lync Management Shell (2/8)
      3. Chapter 8: Introduction to PowerShell and the Lync Management Shell (3/8)
      4. Chapter 8: Introduction to PowerShell and the Lync Management Shell (4/8)
      5. Chapter 8: Introduction to PowerShell and the Lync Management Shell (5/8)
      6. Chapter 8: Introduction to PowerShell and the Lync Management Shell (6/8)
      7. Chapter 8: Introduction to PowerShell and the Lync Management Shell (7/8)
      8. Chapter 8: Introduction to PowerShell and the Lync Management Shell (8/8)
        1. Why Use PowerShell?
        2. Understanding Command Syntax
        3. Managing Output
        4. Running Scripts
        5. The Bottom Line
      9. Chapter 9: Role-Based Access Control (1/5)
      10. Chapter 9: Role-Based Access Control (2/5)
      11. Chapter 9: Role-Based Access Control (3/5)
      12. Chapter 9: Role-Based Access Control (4/5)
      13. Chapter 9: Role-Based Access Control (5/5)
        1. RBAC Overview
        2. Understanding Lync’s Standard Roles
        3. Creating New Roles
        4. Manipulating Roles
        5. The Bottom Line
      14. Chapter 10: User Administration (1/7)
      15. Chapter 10: User Administration (2/7)
      16. Chapter 10: User Administration (3/7)
      17. Chapter 10: User Administration (4/7)
      18. Chapter 10: User Administration (5/7)
      19. Chapter 10: User Administration (6/7)
      20. Chapter 10: User Administration (7/7)
        1. User Configuration Basics
        2. Understanding Lync Policies
        3. Manipulating Policies
        4. Choosing the Right Policy for the Job
        5. The Bottom Line
      21. Chapter 11: Archiving and Monitoring (1/7)
      22. Chapter 11: Archiving and Monitoring (2/7)
      23. Chapter 11: Archiving and Monitoring (3/7)
      24. Chapter 11: Archiving and Monitoring (4/7)
      25. Chapter 11: Archiving and Monitoring (5/7)
      26. Chapter 11: Archiving and Monitoring (6/7)
      27. Chapter 11: Archiving and Monitoring (7/7)
        1. Deploying the Architecture for Archiving and Monitoring
        2. Interpreting the Monitoring Server Reports
        3. Service Monitoring with the Management Pack
        4. The Bottom Line
      28. Chapter 12: Troubleshooting (1/6)
      29. Chapter 12: Troubleshooting (2/6)
      30. Chapter 12: Troubleshooting (3/6)
      31. Chapter 12: Troubleshooting (4/6)
      32. Chapter 12: Troubleshooting (5/6)
      33. Chapter 12: Troubleshooting (6/6)
        1. Troubleshooting Basics
        2. Introducing Tracing
        3. Other Troubleshooting Options
        4. The Bottom Line
    10. Part 4: Voice
      1. Chapter 13: Getting Started with Voice (1/6)
      2. Chapter 13: Getting Started with Voice (2/6)
      3. Chapter 13: Getting Started with Voice (3/6)
      4. Chapter 13: Getting Started with Voice (4/6)
      5. Chapter 13: Getting Started with Voice (5/6)
      6. Chapter 13: Getting Started with Voice (6/6)
        1. The Back Story
        2. Understanding the Voice Capabilities
        3. Understanding the Voice Architecture
        4. Configuring Enterprise Voice
        5. The Bottom Line
      7. Chapter 14: Call Admission Control (1/8)
      8. Chapter 14: Call Admission Control (2/8)
      9. Chapter 14: Call Admission Control (3/8)
      10. Chapter 14: Call Admission Control (4/8)
      11. Chapter 14: Call Admission Control (5/8)
      12. Chapter 14: Call Admission Control (6/8)
      13. Chapter 14: Call Admission Control (7/8)
      14. Chapter 14: Call Admission Control (8/8)
        1. Understanding Call Admission Control
        2. Designing for Call Admission Control
        3. Configuring Call Admission Control
        4. Identifying Calls on a Network
        5. Reporting on Call Admission Control
        6. The Bottom Line
      15. Chapter 15: E911 and Location Information Services (LIS) (1/4)
      16. Chapter 15: E911 and Location Information Services (LIS) (2/4)
      17. Chapter 15: E911 and Location Information Services (LIS) (3/4)
      18. Chapter 15: E911 and Location Information Services (LIS) (4/4)
        1. Understanding E911
        2. Configuring E911
        3. Location Information
        4. The Bottom Line
      19. Chapter 16: Extended Voice Functionality (1/9)
      20. Chapter 16: Extended Voice Functionality (2/9)
      21. Chapter 16: Extended Voice Functionality (3/9)
      22. Chapter 16: Extended Voice Functionality (4/9)
      23. Chapter 16: Extended Voice Functionality (5/9)
      24. Chapter 16: Extended Voice Functionality (6/9)
      25. Chapter 16: Extended Voice Functionality (7/9)
      26. Chapter 16: Extended Voice Functionality (8/9)
      27. Chapter 16: Extended Voice Functionality (9/9)
        1. Dial-In Conferencing
        2. Response Groups
        3. Call Park
        4. Unassigned Numbers
        5. The Bottom Line
    11. Part 5: Integration
      1. Chapter 17: Exchange, SharePoint, and Group Chat (1/8)
      2. Chapter 17: Exchange, SharePoint, and Group Chat (2/8)
      3. Chapter 17: Exchange, SharePoint, and Group Chat (3/8)
      4. Chapter 17: Exchange, SharePoint, and Group Chat (4/8)
      5. Chapter 17: Exchange, SharePoint, and Group Chat (5/8)
      6. Chapter 17: Exchange, SharePoint, and Group Chat (6/8)
      7. Chapter 17: Exchange, SharePoint, and Group Chat (7/8)
      8. Chapter 17: Exchange, SharePoint, and Group Chat (8/8)
        1. Integrating Lync with Exchange
        2. Integrating Lync with SharePoint
        3. Integrating Lync with Group Chat
        4. The Bottom Line
      9. Chapter 18: Third-Party Integration (1/9)
      10. Chapter 18: Third-Party Integration (2/9)
      11. Chapter 18: Third-Party Integration (3/9)
      12. Chapter 18: Third-Party Integration (4/9)
      13. Chapter 18: Third-Party Integration (5/9)
      14. Chapter 18: Third-Party Integration (6/9)
      15. Chapter 18: Third-Party Integration (7/9)
      16. Chapter 18: Third-Party Integration (8/9)
      17. Chapter 18: Third-Party Integration (9/9)
        1. Connecting to Telephony Systems via a Gateway
        2. Integrating with Your PBX
        3. Using RCC to Integrate with Your PBX
        4. Deploying a Survivable Branch Appliance
        5. Connecting to Other External Systems via an XMPP Gateway
        6. Integrating with Hardware Video Conferencing Platforms
        7. Using Third-Party Software Enhancements
        8. The Bottom Line
    12. Part 6: Mobile Devices
      1. Chapter 19: Mobile Devices (1/4)
      2. Chapter 19: Mobile Devices (2/4)
      3. Chapter 19: Mobile Devices (3/4)
      4. Chapter 19: Mobile Devices (4/4)
        1. Mobile Devices and the Unified Communications Model
        2. Understanding the Lync 2010 Mobile Client
        3. Planning for Mobility Services
        4. Configuring the Mobility Service
        5. Installing the Mobility Service Update
        6. The Bottom Line
    13. Appendix A: The Bottom Line
      1. Chapter 1: What’s in Lync?
      2. Chapter 2: Standards and Protocols
      3. Chapter 3: Security
      4. Chapter 4: Clients
      5. Chapter 5: Planning Your Deployment
      6. Chapter 6: Installation
      7. Chapter 7: Migration and Upgrades
      8. Chapter 8: Introduction to PowerShell and the Lync Management Shell
      9. Chapter 9: Role-Based Access Control
      10. Chapter 10: User Administration
      11. Chapter 11: Archiving and Monitoring
      12. Chapter 12: Troubleshooting
      13. Chapter 13: Getting Started with Voice
      14. Chapter 14: Call Admission Control
      15. Chapter 15: E911 and Location Information Services (LIS)
      16. Chapter 16: Extended Voice Functionality
      17. Chapter 17: Exchange, SharePoint, and Group Chat
      18. Chapter 18: Third-Party Integration
      19. Chapter 19: Mobile Devices
    14. Appendix B: Adoption
      1. Understanding the Power of UC
      2. Introducing Lync to Your Business (1/2)
      3. Introducing Lync to Your Business (2/2)
    15. Index (1/6)
    16. Index (2/6)
    17. Index (3/6)
    18. Index (4/6)
    19. Index (5/6)
    20. Index (6/6)

Product information

  • Title: Mastering: Microsoft® Lync™ Server 2010
  • Author(s): Nathan Winters, Keith Hanna
  • Release date: February 2012
  • Publisher(s): Sybex
  • ISBN: 9781118089538