Datasheet
Office Communications Server 2007 R2 Product Overview – v 2009.1.30 54
Improve compliance and security
A key benefit of moving to an organization-wide instant messaging system is increase security and
compliance. Office Communications Server 2007 R2 is designed to help address security and compliance
needs across a range of communications modes.
More secure communications
Office Communicator 2007 R2 and Office Communications Server 2007 R2 are built with security in
mind. The platform includes built-in filtering and spam IM (SPIM) control, the ability to restrict user
functions, Web link and document exchange, and external access according to corporate policy. It also
supports standard security measures like HTTPS external access certificate, encrypted SIP and media
encryption for more secure communications from all endpoints across managed and unmanaged
networks.
More secure communications from outside the firewall
Office Communications Server 2007 R2, Office Communicator 2007 R2, and the Office Live Meeting
client leverage open protocols and an architecture that includes Edge server roles and media relay
functionality. This allows users to access all of the communication types offered by the solution,
regardless of whether they are working on a corporate network, at home, in a coffee shop— all without
requiring a VPN connection back to the corporate network.
More secure conferencing
Office Communications Server 2007 R2 includes role-based security and authorization for conference
control. Scheduling is restricted to users who have Active Directory credentials in the internal network
and are enabled for Office Communications Server 2007 R2. In addition, conference passwords and
digest authentication are required for anonymous users to join meetings. IT administrators can
configure their Office Communications Server 2007 multimedia conferencing infrastructures to support
meetings that include specific types of users.
Internal users. If an organization does not deploy Edge servers, all participants have persistent
Active Directory identities within the organization and can connect only from within the
organization’s firewall.
Authenticated users. All users have Active Directory identities within the organization or within
a federated organization, and can connect from inside or outside the organization’s firewall.
Meetings that are open only to authenticated users can be of one of two types.
1. Open Authenticated. All organization users can join the meeting. They join as
attendees unless they have been designated as presenters by the meeting
organizer. Federated users can join the meeting as attendees if they are invited by
the organizer. Federated users cannot join meetings as a presenter, but they can be
promoted to presenter during meetings.
2. Closed Authenticated. Only authenticated users who are on the meeting organizer’s
presenter and attendee lists are allowed to attend a closed authenticated meeting.










