Skype - 2.0 Betriebsanweisung

Stöbern Sie online oder laden Sie Betriebsanweisung nach Vernetzung Skype - 2.0 herunter. Skype - 2.0 Administrator's Guide Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken

Inhaltsverzeichnis

Seite 1 - IT Administrators

IT AdministratorsGuideSkype™ for Windows® version 4.2Version 2.0Copyright © Skype Limited 2010

Seite 2 - Overview

Page 10 IT Administrators Guide ˚Are allowed by your specic Group Policy Object (GPO)Only a very small percentage of Skype users in your network (i

Seite 3 - Important legal information

Page 11 IT Administrators Guide it can use TCP for the media stream (with the additional overhead due to TCP being stateful). Before a user places th

Seite 4 - Disclaimer

Page 12 IT Administrators Guide 2.2.2 NAT configurationSkype automatically traverses most rewalls and NATs using UDP hole punching, a common techni

Seite 5 - Table of Contents

Page 13 IT Administrators Guide Note:Don’t worry if Skype establishes a large number of connections. 2.2.3 HTTPS/SOCKS5 proxiesMany large organizati

Seite 6 - 1.0 Introduction to Skype

Page 14 IT Administrators Guide 2.2.5 Network impactSkype is uniquely designed to function over corporate networks with little impact on their perfo

Seite 7 - 1.1.2 Skype Manager

Page 15 IT Administrators Guide vary signicantly, depending on the number of contacts on each list and how often they change. Calculating specic ba

Seite 8 - 1.1.3 Skype for SIP

Page 16 IT Administrators Guide ˚File transfers ˚Skype API ˚Status type ˚Personalization ˚Proxy setting ˚Premium servicesThere are two ways to contr

Seite 9 - 2.0 Architecture overview

Page 17 IT Administrators Guide The administrative template le doesn’t actually apply policy settings, but lets you see them in the GPO Editor. From

Seite 10 - 2.1.2 Operation

Page 18 IT Administrators Guide have signed up to Skype Manager as its administrator, you can set up business accounts for your employees and create

Seite 11

Page 19 IT Administrators Guide 3.0 Security and privacyWe’re committed to secure communications and protecting our users’ privacy. We follow the lat

Seite 12 - 2.2.2 NAT configuration

Page 2 IT Administrators Guide OverviewSkype lets your business work the way you want to, whatever the message, wherever people are. This guide shows

Seite 13 - 2.2.4 Relays

Page 20 IT Administrators Guide In addition, Skype cannot protect users’ hardware against the introduction of spyware or malware, which could comprom

Seite 14 - 2.2.5 Network impact

Page 21 IT Administrators Guide Specically, users can set preferences determining whether: ˚Anyone can call or IM ˚Only people on their contacts lis

Seite 15

Page 22 IT Administrators Guide 3.4.1 Password securitySkype never requests a user’s account name or password by email. Skype passwords are stored a

Seite 16 - 2.4.2 Group policies

Page 23 IT Administrators Guide 3.4.3 Falsifying user identityIt's highly unlikely that anyone could impersonate another user’s Skype identity.

Seite 17 - 2.4.3 XML configuration files

Page 24 IT Administrators Guide 3.4.6 Security and Skype for SIPSkype for SIP does not, currently, offer sRTP or other forms of voice encryption. Voi

Seite 18 - 2.6 Compliance

Page 25 IT Administrators Guide ˚Instruct your users to choose strong Skype passwords and to change them regularly. ˚Instruct your users not to chec

Seite 19 - 3.0 Security and privacy

Page 26 IT Administrators Guide 4.0 Appendix 1: Congurable policiesThese are the policies available for controlling Skype from a single location, us

Seite 20 - 3.3 Privacy

Page 27 IT Administrators Guide DisableVersionCheckPolicy DisableVersionCheck, REG_DWORD = {0,1}Skype upgrade checks do detect new versions and upda

Seite 21 - 3.4 Security best practice

Page 28 IT Administrators Guide ProxyPolicy ProxySetting, REG_SZ = {string}Skype uses proxy settings:Empty string = unset = Skype tries to connect d

Seite 22 - 3.4.2 Viruses and Trojans

Page 29 IT Administrators Guide 5.0 Appendix 2: File locationsThe locations of the les created during the installation process are listed below:Desc

Seite 23 - 3.4.5 Adware and spyware

Page 3 IT Administrators Guide Who should read this guide?This guide is for system and network administrators responsible for determining networking

Seite 24 - 3.4.7 Security summary

Page 30 IT Administrators Guide 6.0 Appendix 3: Additional informationFor more information on Skype: ˚Skype for Business: skype.com/business ˚Skype

Seite 25

Page 4 IT Administrators Guide Trade MarksSkype, the Skype logo, Skyper Manager, SILK are all trade marks of Skype Limited. Microsoft and Windows are

Seite 26 - 4.0 Appendix 1: Congurable

Page 5 IT Administrators Guide Table of Contents1.0 Introduction to Skype : Page 61.1 How Skype can help your business : Page 61.1.1 Skype : Page

Seite 27

Page 6 IT Administrators Guide 1.0 Introduction to SkypeSkype brings business people together, helping your business overcome the barriers of cost,

Seite 28

Page 7 IT Administrators Guide You can view the selected online status of colleagues on Skype and contact them immediately via free Skype-to-Skype ca

Seite 29

Page 8 IT Administrators Guide 1.1.3 Skype for SIPSkype for SIP is available via Skype Manager. If you have a SIP-enabled PBX, your business can tak

Seite 30 - 6.0 Appendix 3: Additional

Page 9 IT Administrators Guide 2.0 Architecture overviewSkype's innovative collaboration and communications tools are quick to set up. The platf

Kommentare zu diesen Handbüchern

Keine Kommentare