Organize With Office 365
Scott Stephenson is in his sixth year as the Cisco Networking Academy instructor at Burleson High School. His teaching duties include Cisco Networking Academy CCNA 1-4, Cisco Networking Academy IT Essentials, business computer programming, web design, and business computer information systems. He also teaches networking at Tarrant County College, and technology applications for Burleson Continuing Education. He holds A+ IT Technician, A+ Depot Technician, Server +, Network +, CCNA, Cisco Certified Academy Instructor Trainer, Microsoft Office Specialist, WebYoda Associate Webmaster, WebYoda Certified Webmaster, and WebYoda Academy Instructor technology certifications. He was the band director at Ballinger High School in Ballinger, Texas, for 16 years before entering the technology field. He graduated from Angelo State University, with a bachelor's degree in music education. In 2006, he earned a Master of Science Management Information Systems degree from Kenney-Western University.
In addition to the scalability benefits, users upgrading to Cisco Unified CME also receive additional features from the UC500 series. For example, CME supports Cisco Unified CallConnector for Microsoft Office, which allows users to integrate their IP phone with Microsoft Office components such as Outlook and Internet Explorer. Using this feature, a user can click a contact in Outlook and quickly dial them from an IP phone, or even highlight a phone number in a PowerPoint presentation and have their phone auto-dial the number.
Martin & Martin currently uses Microsoft Office applications and Exchange for mail. However, Martin & Martin is concerned about network security and wants a recommendation to secure the traffic of three specific departments Human Resources, Accounting and Finance, and Corporate Administration. Mr. Jones needs to provide Internet security for the entire corporation. However, due to the sensitivity of the information in these departments, Mr. Jones wants to secure each segment so that access will be strictly defined. With the growth of the remote offices and a network audit in the near future, Mr. Jones wants to secure these networks. The senior partners are also considering the use of video and audio files in the Research department for reference. Mr. Jones is interested in a centralized IS management that can monitor devices and eventually grow to remote monitoring and proactive monitoring with the new offices. However, he is concerned that the new network would require a more...
CSC-SSM provides protection for file transfers using FTP. CSC-SSM allows both the scanning of FTP network traffic for viruses and other malware and the blocking of file transfers based upon file types. File types that can be blocked include MP3, JPG, EXE, Java, and Microsoft Office file extensions. The file transfer, or FTP, scanning, and blocking configuration options are very similar to the web scanning and file blocking features described in the web section for CSC-SSM in this chapter.
After the application is installed, the application can be started from the Start menu or from a shortcut icon that the application installs on the desktop. Check the application to ensure that it is functioning properly. If there are problems with the application, make the repair or uninstall the application. Some applications, such as Microsoft Office, provide a repair option in the install process. You can use this function to try to correct a program that is not working properly.