Cisco Unity Connection User Setup Guide, Release 1.x
Index

Table Of Contents

A - B - C - D - E - F - G - I - L - M - N - O - P - R - S - T - U -

Index

A

Apple Mail, configuring to access voice messages 3-2

Apple Safari, configuring to access the Cisco PCA 1-2

B

browser, configuring to access the Cisco PCA 1-1

C

caller groups, user settings in Cisco Unity Personal Call Transfer Rules 5-6

caller options

user settings in Cisco Unity Assistant 5-3

user settings in Cisco Unity Personal Call Transfer Rules 5-6

call holding

user settings in Cisco Unity Assistant 5-3

user settings in Cisco Unity Personal Call Transfer Rules 5-5

call screening

user settings in Cisco Unity Assistant 5-3

user settings in Cisco Unity Personal Call Transfer Rules 5-5

call transfers

user settings in Cisco Unity Assistant 5-3

user settings in Cisco Unity Personal Call Transfer Rules 5-6

user settings in Connection conversation 5-3, 5-6

changing Cisco PCA password 1-3

Cisco PCA

configuring browser to access 1-1

managing security alerts when using SSL connections 1-5

securing and changing password 1-3

Cisco Personal Communications Assistant. See Cisco PCA

Cisco Unified Personal Communicator, configuring to access voice messages 3-1

Cisco Unity Inbox, customizing for low-bandwidth deployment 1-4

configuring

browser to access the Cisco PCA 1-1

e-mail application to access voice messages 3-1

conversation options

user settings in Cisco Unity Assistant 5-4

user settings in Connection conversation 5-4

conversation speed, addressing user concerns 6-7

customizing Cisco Unity Inbox for low-bandwidth deployment 1-4

D

delayed messages, addressing user concerns 6-3

deleted messages, addressing user concerns 6-3

destinations, user settings in Cisco Unity Personal Call Transfer Rules 5-6

directory listing, addressing user concerns 6-4

E

e-mail application, configuring to access voice messages 3-1

Entourage, configuring to access voice messages 3-3

Eudora, configuring to access voice messages 3-5

F

full mailbox, addressing user concerns 6-5

G

greetings

user settings in Cisco Unity Assistant 5-4

user settings in Connection conversation 5-4

GroupWise, configuring to access voice messages 3-12

I

IBM Lotus Notes, configuring to access voice messages 3-6

L

low bandwidth, customizing Cisco Unity Inbox for 1-4

M

managing security alerts when using SSL connections 1-5

Media Master, about 2-1

message addressing

user settings in Cisco Unity Assistant 5-4

user settings in Connection conversation 5-4

message notification

addressing user concerns 6-6

user settings in Cisco Unity Assistant 5-4

user settings in Connection conversation 5-4

message playback

user settings in Cisco Unity Assistant 5-4

user settings in Connection conversation 5-4

message types, addressing user concerns 6-6

Microsoft Internet Explorer, configuring to access the Cisco PCA 1-2

Microsoft Outlook, configuring to access voice messages 3-8

Microsoft Outlook Express, configuring to access voice messages 3-9

misconceptions, potential user 6-3

Mozilla Firefox, configuring to access the Cisco PCA 1-2

N

Netscape, configuring to access voice messages 3-11

Notes, configuring to access voice messages 3-6

Novell GroupWise, configuring to access voice messages 3-12

O

Opera, configuring to access voice messages 3-14

operator orientation 6-1

orientation

for operators 6-1

for support desk 6-2

for users 5-1

P

passwords

addressing user concerns 6-6

securing and changing Cisco PCA 1-3

Personal Communications Assistant. See Cisco PCA

personal contacts, user settings in Cisco Unity Personal Call Transfer Rules 5-6

personal settings

user settings in Cisco Unity Assistant 5-5

user settings in Connection conversation 5-5

playback device

considerations for choosing 2-2

events when computer speakers are used 2-3

events when phone is used 2-3

how users specify 2-3

private lists

user settings in Cisco Unity Assistant 5-5

user settings in Connection conversation 5-5

R

recording device

considerations for choosing 2-2

events when computer microphone is used 2-3

events when phone is used 2-3

how users specify 2-3

S

security alerts

addressing user concerns 6-3

managing when using SSL connections 1-5

setting up user phones 4-1

SSL, managing security alerts 1-5

support desk

orientation 6-2

resources 6-2

T

Thunderbird, configuring to access voice messages 3-15

U

unsent messages, addressing user concerns 6-7

user misconceptions, potential 6-3

user orientation 5-1

user phones, task list for setup 4-1