Skype - 2.0 Podręcznik Użytkownika

Przeglądaj online lub pobierz Podręcznik Użytkownika dla Networking Skype - 2.0. Skype - 2.0 Administrator's Guide Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj

Podsumowanie treści

Strona 1 - IT Administrators

IT AdministratorsGuideSkype™ for Windows® version 4.2Version 2.0Copyright © Skype Limited 2010

Strona 2 - Overview

Page 10 IT Administrators Guide ˚Are allowed by your specic Group Policy Object (GPO)Only a very small percentage of Skype users in your network (i

Strona 3 - Important legal information

Page 11 IT Administrators Guide it can use TCP for the media stream (with the additional overhead due to TCP being stateful). Before a user places th

Strona 4 - Disclaimer

Page 12 IT Administrators Guide 2.2.2 NAT configurationSkype automatically traverses most rewalls and NATs using UDP hole punching, a common techni

Strona 5 - Table of Contents

Page 13 IT Administrators Guide Note:Don’t worry if Skype establishes a large number of connections. 2.2.3 HTTPS/SOCKS5 proxiesMany large organizati

Strona 6 - 1.0 Introduction to Skype

Page 14 IT Administrators Guide 2.2.5 Network impactSkype is uniquely designed to function over corporate networks with little impact on their perfo

Strona 7 - 1.1.2 Skype Manager

Page 15 IT Administrators Guide vary signicantly, depending on the number of contacts on each list and how often they change. Calculating specic ba

Strona 8 - 1.1.3 Skype for SIP

Page 16 IT Administrators Guide ˚File transfers ˚Skype API ˚Status type ˚Personalization ˚Proxy setting ˚Premium servicesThere are two ways to contr

Strona 9 - 2.0 Architecture overview

Page 17 IT Administrators Guide The administrative template le doesn’t actually apply policy settings, but lets you see them in the GPO Editor. From

Strona 10 - 2.1.2 Operation

Page 18 IT Administrators Guide have signed up to Skype Manager as its administrator, you can set up business accounts for your employees and create

Strona 11

Page 19 IT Administrators Guide 3.0 Security and privacyWe’re committed to secure communications and protecting our users’ privacy. We follow the lat

Strona 12 - 2.2.2 NAT configuration

Page 2 IT Administrators Guide OverviewSkype lets your business work the way you want to, whatever the message, wherever people are. This guide shows

Strona 13 - 2.2.4 Relays

Page 20 IT Administrators Guide In addition, Skype cannot protect users’ hardware against the introduction of spyware or malware, which could comprom

Strona 14 - 2.2.5 Network impact

Page 21 IT Administrators Guide Specically, users can set preferences determining whether: ˚Anyone can call or IM ˚Only people on their contacts lis

Strona 15

Page 22 IT Administrators Guide 3.4.1 Password securitySkype never requests a user’s account name or password by email. Skype passwords are stored a

Strona 16 - 2.4.2 Group policies

Page 23 IT Administrators Guide 3.4.3 Falsifying user identityIt's highly unlikely that anyone could impersonate another user’s Skype identity.

Strona 17 - 2.4.3 XML configuration files

Page 24 IT Administrators Guide 3.4.6 Security and Skype for SIPSkype for SIP does not, currently, offer sRTP or other forms of voice encryption. Voi

Strona 18 - 2.6 Compliance

Page 25 IT Administrators Guide ˚Instruct your users to choose strong Skype passwords and to change them regularly. ˚Instruct your users not to chec

Strona 19 - 3.0 Security and privacy

Page 26 IT Administrators Guide 4.0 Appendix 1: Congurable policiesThese are the policies available for controlling Skype from a single location, us

Strona 20 - 3.3 Privacy

Page 27 IT Administrators Guide DisableVersionCheckPolicy DisableVersionCheck, REG_DWORD = {0,1}Skype upgrade checks do detect new versions and upda

Strona 21 - 3.4 Security best practice

Page 28 IT Administrators Guide ProxyPolicy ProxySetting, REG_SZ = {string}Skype uses proxy settings:Empty string = unset = Skype tries to connect d

Strona 22 - 3.4.2 Viruses and Trojans

Page 29 IT Administrators Guide 5.0 Appendix 2: File locationsThe locations of the les created during the installation process are listed below:Desc

Strona 23 - 3.4.5 Adware and spyware

Page 3 IT Administrators Guide Who should read this guide?This guide is for system and network administrators responsible for determining networking

Strona 24 - 3.4.7 Security summary

Page 30 IT Administrators Guide 6.0 Appendix 3: Additional informationFor more information on Skype: ˚Skype for Business: skype.com/business ˚Skype

Strona 25

Page 4 IT Administrators Guide Trade MarksSkype, the Skype logo, Skyper Manager, SILK are all trade marks of Skype Limited. Microsoft and Windows are

Strona 26 - 4.0 Appendix 1: Congurable

Page 5 IT Administrators Guide Table of Contents1.0 Introduction to Skype : Page 61.1 How Skype can help your business : Page 61.1.1 Skype : Page

Strona 27

Page 6 IT Administrators Guide 1.0 Introduction to SkypeSkype brings business people together, helping your business overcome the barriers of cost,

Strona 28

Page 7 IT Administrators Guide You can view the selected online status of colleagues on Skype and contact them immediately via free Skype-to-Skype ca

Strona 29

Page 8 IT Administrators Guide 1.1.3 Skype for SIPSkype for SIP is available via Skype Manager. If you have a SIP-enabled PBX, your business can tak

Strona 30 - 6.0 Appendix 3: Additional

Page 9 IT Administrators Guide 2.0 Architecture overviewSkype's innovative collaboration and communications tools are quick to set up. The platf

Komentarze do niniejszej Instrukcji

Brak uwag