Table Of Contents
A - B - C - D - E - F - G - I - L - M - N - O - P - R - S - T - U -
Index
A
Apple Mail, configuring to access voice messages 3-2
Apple Safari, configuring to access the Cisco PCA 1-2
B
browser, configuring to access the Cisco PCA 1-1
C
caller groups, user settings in Cisco Unity Personal Call Transfer Rules 5-6
caller options
user settings in Cisco Unity Assistant 5-3
user settings in Cisco Unity Personal Call Transfer Rules 5-6
call holding
user settings in Cisco Unity Assistant 5-3
user settings in Cisco Unity Personal Call Transfer Rules 5-5
call screening
user settings in Cisco Unity Assistant 5-3
user settings in Cisco Unity Personal Call Transfer Rules 5-5
call transfers
user settings in Cisco Unity Assistant 5-3
user settings in Cisco Unity Personal Call Transfer Rules 5-6
user settings in Connection conversation 5-3, 5-6
changing Cisco PCA password 1-3
Cisco PCA
configuring browser to access 1-1
managing security alerts when using SSL connections 1-5
securing and changing password 1-3
Cisco Personal Communications Assistant. See Cisco PCA
Cisco Unified Personal Communicator, configuring to access voice messages 3-1
Cisco Unity Inbox, customizing for low-bandwidth deployment 1-4
configuring
browser to access the Cisco PCA 1-1
e-mail application to access voice messages 3-1
conversation options
user settings in Cisco Unity Assistant 5-4
user settings in Connection conversation 5-4
conversation speed, addressing user concerns 6-7
customizing Cisco Unity Inbox for low-bandwidth deployment 1-4
D
delayed messages, addressing user concerns 6-3
deleted messages, addressing user concerns 6-3
destinations, user settings in Cisco Unity Personal Call Transfer Rules 5-6
directory listing, addressing user concerns 6-4
E
e-mail application, configuring to access voice messages 3-1
Entourage, configuring to access voice messages 3-3
Eudora, configuring to access voice messages 3-5
F
full mailbox, addressing user concerns 6-5
G
greetings
user settings in Cisco Unity Assistant 5-4
user settings in Connection conversation 5-4
GroupWise, configuring to access voice messages 3-12
I
IBM Lotus Notes, configuring to access voice messages 3-6
L
low bandwidth, customizing Cisco Unity Inbox for 1-4
M
managing security alerts when using SSL connections 1-5
Media Master, about 2-1
message addressing
user settings in Cisco Unity Assistant 5-4
user settings in Connection conversation 5-4
message notification
addressing user concerns 6-6
user settings in Cisco Unity Assistant 5-4
user settings in Connection conversation 5-4
message playback
user settings in Cisco Unity Assistant 5-4
user settings in Connection conversation 5-4
message types, addressing user concerns 6-6
Microsoft Internet Explorer, configuring to access the Cisco PCA 1-2
Microsoft Outlook, configuring to access voice messages 3-8
Microsoft Outlook Express, configuring to access voice messages 3-9
misconceptions, potential user 6-3
Mozilla Firefox, configuring to access the Cisco PCA 1-2
N
Netscape, configuring to access voice messages 3-11
Notes, configuring to access voice messages 3-6
Novell GroupWise, configuring to access voice messages 3-12
O
Opera, configuring to access voice messages 3-14
operator orientation 6-1
orientation
for operators 6-1
for support desk 6-2
for users 5-1
P
passwords
addressing user concerns 6-6
securing and changing Cisco PCA 1-3
Personal Communications Assistant. See Cisco PCA
personal contacts, user settings in Cisco Unity Personal Call Transfer Rules 5-6
personal settings
user settings in Cisco Unity Assistant 5-5
user settings in Connection conversation 5-5
playback device
considerations for choosing 2-2
events when computer speakers are used 2-3
events when phone is used 2-3
how users specify 2-3
private lists
user settings in Cisco Unity Assistant 5-5
user settings in Connection conversation 5-5
R
recording device
considerations for choosing 2-2
events when computer microphone is used 2-3
events when phone is used 2-3
how users specify 2-3
S
security alerts
addressing user concerns 6-3
managing when using SSL connections 1-5
setting up user phones 4-1
SSL, managing security alerts 1-5
support desk
orientation 6-2
resources 6-2
T
Thunderbird, configuring to access voice messages 3-15
U
unsent messages, addressing user concerns 6-7
user misconceptions, potential 6-3
user orientation 5-1
user phones, task list for setup 4-1