
Licensed Customer Confidential
Email Continuity Administrator Guide version 6.5 (1st ed.) vii
Task Reference
To grant service account permissions for Exchange 5.5:.......................................................................... 23
To grant Exchange administrator permissions for Exchange 2000/2003: ................................................. 24
To grant Send As and Receive As permissions: ....................................................................................... 25
To add the Email Continuity account to the local administrator group of the BES group:......................... 30
To enable TCP and Name Pipes to have access to the BES database:................................................... 30
To verify that the MDS server is a push server and has an appropriate listening port configured: ........... 31
To set IT policies: ...................................................................................................................................... 32
To install service software: ........................................................................................................................ 43
To launch the SyncManager Setup Wizard manually:............................................................................... 50
To configure the SyncManager: ................................................................................................................ 50
To configure distributed synchronization with SyncManager: ................................................................... 57
To install RedirectorManager: ................................................................................................................... 58
To install RedirectorSink on clustered Exchange servers: ........................................................................ 59
To install the RedirectorAgent: .................................................................................................................. 61
To remove the RedirectorAgent: ............................................................................................................... 61
To synchronize RIM data:.......................................................................................................................... 62
To download the client agent:.................................................................................................................... 64
To configure the agent:.............................................................................................................................. 65
To assign software applications to users:.................................................................................................. 66
To remove the Blackberry agent for all users:........................................................................................... 66
To remove the Blackberry agent for one user: .......................................................................................... 67
To prepare the shared application directory:............................................................................................. 67
To update your IT policies: ........................................................................................................................ 69
To download the client agent:.................................................................................................................... 69
To add the client application to BAS:......................................................................................................... 69
To create and populate application policies: ............................................................................................. 70
To create and populate the software configuration: .................................................................................. 70
To create a BlackBerry client user group: ................................................................................................. 71
To assign the software configuration to the BlackBerry client user group:................................................ 71
To send installation instructions to device users: ...................................................................................... 71
To authenticate users through the command line (prior to Outlook Extension deployment):.................... 76
To install the Outlook Extension manually using setup.exe: ..................................................................... 76
To remove the Outlook Extension manually:............................................................................................. 77
To install the Outlook Extension using Group Policy:................................................................................ 77
To upgrade the Outlook Extension using Group Policy:............................................................................ 78
To remove the Outlook Extension using Group Policy: ............................................................................. 78
To install the Outlook Extension using SMS:............................................................................................. 79
To upgrade the Outlook Extension using SMS:......................................................................................... 79
To remove the Outlook Extension using SMS:.......................................................................................... 81
To install the Historical Mail software on a VaultBox system: ................................................................... 83
To change data transfer settings:.............................................................................................................. 87
To log into the Administration Console:..................................................................................................... 94
To create a retention policy: .................................................................................................................... 102
To add users to a retention policy: .......................................................................................................... 102
To prioritize retention policies:................................................................................................................. 103
To view storage reports: .......................................................................................................................... 104
To assign servers to replication zones: ................................................................................................... 105
To search user information:..................................................................................................................... 106
To reset a user’s password: .................................................................................................................... 107
To change multiple users’ passwords: .................................................................................................... 108
Kommentare zu diesen Handbüchern