![](//vs1.manuzoid.com/store/data-gzf/0af9632d5444a65abf807028b1653bb5/2/001458787.htmlex.zip/bg9.jpg)
Table of Contents
Polycom, Inc vii
Configuring the Collaboration Server to Enable Recording ..........................................14-2
Defining the Recording Link ......................................................................................14-2
Enabling the Recording Features in a Conference IVR Service ............................. 14-4
Enabling the Recording in the Conference Profile .................................................. 14-5
Recording Link Encryption .........................................................................................14-7
Recording Link Encryption Flag Setting ........................................................... 14-7
Recording Link Settings .......................................................................................14-8
Managing the Recording Process .......................................................................................14-8
Recording Link Layout ................................................................................................ 14-9
Using the Collaboration Server Web Client to Manage the Recording
Process ..........................................................................................................................14-10
Using DTMF Codes to Manage the Recording Process ........................................ 14-11
Conference Recording with Codian IP VCR .................................................................. 14-11
Users, Connections and Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-1
Users ....................................................................................................................................... 15-1
User Types ..................................................................................................................... 15-1
Administrator ........................................................................................................15-1
Administrator Read-only .................................................................................... 15-1
Operator ................................................................................................................. 15-1
Chairperson ...........................................................................................................15-2
Auditor ................................................................................................................... 15-2
Machine Account .................................................................................................. 15-2
Guidelines ...................................................................................................................... 15-2
Monitoring ............................................................................................................. 15-3
Active Directory ....................................................................................................15-3
Listing Users .................................................................................................................. 15-3
Adding a New User ..................................................................................................... 15-4
Deleting a User .............................................................................................................. 15-5
Changing a User’s Password ...................................................................................... 15-5
Disabling a User ............................................................................................................ 15-6
Enabling a User ............................................................................................................. 15-6
Renaming a User ..........................................................................................................15-7
Connections ........................................................................................................................... 15-8
Viewing the Connections List .....................................................................................15-8
User and Connection Management ................................................................................... 15-8
Managing the System Users ........................................................................................ 15-9
Disabling/Enabling Users ...................................................................................15-9
Renaming Users .................................................................................................... 15-9
Disabling Inactive Users ...................................................................................... 15-9
Managing the User Login Process .............................................................................15-9
Implementing Strong Passwords ....................................................................... 15-9
Implementing Password Re-Use / History Rules .........................................15-10
Defining Password Aging ................................................................................. 15-10
Maximum Repeating Characters ......................................................................15-11
Defining Password Change Frequency ...........................................................15-11
User Lockout .......................................................................................................15-11
User Login Record ..............................................................................................15-12
Controlling User Sessions .........................................................................................15-12