manuals.online logo
Brands
  1. Home
  2. •
  3. Brands
  4. •
  5. 3Com
  6. •
  7. Software
  8. •
  9. 3Com 10031370-01 User manual

3Com 10031370-01 User manual

Communication Server
Security Setup Guide
CommWorks Ready
Part Number 10031370
Communication Server
Security Setup Guide
CommWorks Ready
Part No. 10031370-01
Published November 2000
3Com Corporation
5400 Bayfront Plaza
Santa Clara, California
95052- 145
3COM CORPOR TION (hereinafter 3Com) LIMITED USE SOFTW RE LICENSE GREEMENT
RE D C REFULLY: By exercising Licensees rights to make and use copies of the SOFTW RE (as may be
provided for below), Licensee agrees to be bound by the terms of this license agreement. IF LICENSEE DOES
NOT GREE TO THE TERMS OF THIS GREEMENT, PROMPTLY RETURN THIS P CK GE TO THE PL CE FROM
WHICH LICENSEE OBT INED IT FOR FULL REFUND.
LICENSE AND PROTECTION
LICENSE GR NT. 3Com grants to the End User (hereinafter Licensee) and Licensee accepts subject to the
following terms and conditions, a nonexclusive, nontransferable right to use the accompanying copy of the
Software limited to the number of communication ports licensed for fax or data exchange.
communication port can be accessed and used by only one network user at any one time; however, all
network users have concurrent single user access. Should 3Com determine that Licensee is in Breach of said
license, Licensee agrees to return the original and all other copies of the Software and Documentation to
3Com. 3Com reserves all rights not expressly granted to Licensee.
PROTECTION OF SOFTWARE.
Licensee agrees to take all reasonable steps to protect the Software and documentation from unauthorized
copying or use. Without limiting any remedies or relief, which may be available to 3Com, Licensee agrees to
pay 3Com for additional licenses if Licensee uses the Software on more than the licensed number of
communication ports or in any way beyond the scope of this License.
COPIES.
ll server and client executable files are contained on the single CD received with this License. Licensee may
make one new copy of the client component of the software per client on the network provided that this
new copy is created as an essential step in the deployment of the Software and is used in no other manner,
or is for archival purposes only to backup use of the Software. ll proprietary rights notices must be
faithfully reproduced and included on such copies. Licensee may not copy the documentation unless for use
by network clients as a step in the deployment of the Software, and for no other reason.
OWNERSHIP.
Ownership of, and title to the Software and Documentation (including any adaptation or copies) shall be
held by 3Com. Copies are provided to Licensee only to allow Licensee to exercise its rights under the License.
TRANSFER OF LICENSE.
Licensee may transfer this License to another person or entity with the prior written approval of 3Com.
3Com shall not unreasonably withhold approval if Licensee advises 3Com in writing of the name and
address of the proposed transferee and the transferee agrees to be bound by this greement. If the License
transfer is approved, Licensee must transfer all copies of the Software and documentation including the
original copies provided in this package and any copies Licensee has legally made.
TERM.
This greement is effective from the date Licensee opens this package, and shall remain in force until
terminated. Licensee may terminate this License at any time by destroying the Documentation and the
Software together with all copies. This greement shall also automatically terminate if Licensee breaches
any of the terms or conditions of this greement. Licensee agrees to destroy the original and all copies of
the Software and Documentation, or to return such copies to 3Com upon termination of this license.
LICENSE AUTHENTICATION.
Use of each Server license is authorized for an initial 30 calendar days providing all licenses are authenticated
by 3Com to allow for continued operation beyond these initial 30 days. If the Server license is not
authenticated within the initial 30 days of operation, on the 31st day, it will cease to transmit and cease to
forward or print received faxes. License uthentication Procedure is described in the Getting Started Guide
included with this CD.
LIMITED WARRANTY AND LIMITED LIABILITY.
uthentication. Licensee will automatically lose all rights under this Limited Warranty unless Licensee
initiates and completes the License uthentication Procedure promptly, completely, and accurately and
return it to 3Com within 30 days of installing and executing the Server Software.
Compatibility. The Software is only compatible with certain personal computers. The Software may not be
compatible with and is not warranted for non-compatible systems. Call 3Com Customer Support for
information on compatibility.
Diskettes and Documentation. 3Com warrants that if the enclosed magnetic diskettes, CD-ROMs or other
media or Documentation are in a damaged or physically defective condition at the time that the License is
purchased and if they are returned to 3Com (postage prepaid) within 90 days of purchase, then 3Com will
provide Licensee with replacements at no charge.
Software. 3Com warrants that if the Software fails to substantially conform to the specifications in the
Documentation and if the nonconformity is reported in writing by Licensee to 3Com within ninety (90) days
from the date that the License is purchased, the 3Com shall use commercially reasonable efforts to remedy
the nonconformity or at its option refund the purchase price.
DISCLAIMER OF WARRANTIES.
3Com makes no warranty, representation or promise not expressly set forth in this agreement. 3Com
disclaims and excludes any and all implied warranties of merchantability and fitness for particular purpose.
3Com does not warrant that the software or documentation will satisfy its requirements or that the software
and documentation are without defect, omission or error or that the operation of the software will be
uninterrupted. This limited warranty gives Licensee specific legal rights.
LIMITATION OF LIABILITY.
3Coms aggregate liability arising from or relating to this agreement or the Software or documentation is
limited to the total of all payments made by or for Licensee for the license. 3COM SH LL NOT IN NY C SE
BE LI BLE FOR NY SPECI L, INCIDENT L, CONSEQUENTI L, INDIRECT OR PUNITIVE D M GES EVEN IF
3COM H S BEEN DVISED OF THE POSSIBILITY OF SUCH D M GES. 3COM IS NOT RESPONSIBLE FOR
LOST PROFITS OR REVENUE, LOSS OF USE OF THE SOFTW RE LOSS OF D T COSTS OF RECRE TING LOST
D T , THE COST OF NY SUBSTITUTE EQUIPMENT OR PROBLEM, OR CL IMS BY NY P RTY OTHER TH N
LICENSEE.
SOLE REMEDY AND ALLOCATION OF RISK.
Licensees sole and exclusive remedy is set forth in this agreement. This agreement defines a mutually
agreed-upon allocation of risk and 3Coms prices and fees reflect such allocation of risk.
GENERAL CONDITIONS.
Governing Law. This agreement shall be governed by, and interpreted in accordance with the laws of the
state of Illinois.
Entire greement. This agreement sets forth the entire understanding and agreement between Licensee
and 3Com and may be amended only in writing signed by both parties. No vendor, distributor, dealer,
retailer, sales person or other person is authorized to modify this agreement or to make any warranty,
representation or promise which is different than, or in addition to the representations or promises of this
agreement.
Waiver. No waiver of any right under this agreement shall be deemed effective unless contained in writing
signed by a duly authorized representative of 3Com, and no waiver of any past or present right arising from
any breach of or failure to perform shall be deemed to be a waiver of any future right arising under this
agreement.
Severability. If any provision in this agreement is invalid or unenforceable, that provision shall be construed,
limited, modified or, if necessary severed, to the extent of necessary to eliminate its invalidity or
unenforceability, and the other provisions of this agreement shall remain unaffected.
DEFINITIONS.
3Com means 3Com Corporation and its subsidiaries, a company with offices in Mount Prospect, Illinois.
Licensee means the person or business entity that purchased this license to use this software or for the
end user for whom such license was purchased.
Software means the computer programs provided in the accompanying package.
Communication port means a single modem or serial port device attached to a personal computer serial
port, the use of which is allowed through the network, by any other network node or machine, locally or
remotely attached - and controlled by the software. Only one personal computer can access, load and
execute the software at any given time for each licensed communication port. The software shall not be
loaded on different/additional local area networks or internetworks. Different/additional networks must
have separate additional licenses.
Documentation means all guidebooks - either in printed or electronic format - and any other printed
material provided by 3Com with the software.
License means the license purchased and granted in this agreement.
LICENSE AUTHENTICATION PROCEDURES are described in the Getting Started Guide accompanying this
license. To protect our licenses and Licensees assurance of exceptional customer and technical services,
each license on a machine running 3Com Server software must be authenticated. For Licensees
convenience, Licensee can authenticate Licensees license via fax, phone or email.
The information required for authentication is stored in the server in a file called REGISTER.TXT. Please allow
five days for authentication.
YEAR 2000 INFORMATION:
For information on Year 2000 compliance and 3Com products, visit the 3Com Year 2000 web page: http://
www.3Com.com/products/yr2000.html
CONTENTS
ABOUT THIS GUIDE
Conventions........................................................................................................................ ix
Year 2000 Compliance ......................................................................................................... x
1INTRODUCING SECURITY
......................................................................................................................Introduction1-1
The Nature of Objects ................................................................................................. 1-1
ccounts..................................................................................................................... 1-2
Groups........................................................................................................................ 1-2
Positive and Negative Security Permissions................................................................... 1-2
Security Glossary .............................................................................................................. 1-3
dding Members to Pre-Defined User Groups ............................................................. 1-4
Pre-Defined User Groups ............................................................................................. 1-5
Security Objects and Permissions ................................................................................ 1-8
2WORKING WITH SECURITY
............................................................................................................... Starting Security2-1
Sorting Security Information........................................................................................ 2-2
Setting Up ccounts ................................................................................................... 2-3
Setting Up Groups....................................................................................................... 2-6
Setting Up Security Permissions ................................................................................... 2-8
Resetting Security...................................................................................................... 2-11
3SECURITY PERMISSION EXAMPLES
Sample Sales Permissions.................................................................................................. 3-1
INDEX
viii
ABOUT THIS GUIDE
This chapter covers security issues over the network, assigning rights and
permissions to users.
If release notes are shipped with your product and the information there differs
from the information in this guide, follow the instructions in the release notes.
Most user guides and release notes are available in dobe crobat Reader
Portable Document Format (PDF) or HTML on the 3Com World Wide Web site:
http://totalservice.3com.com/
Conventions Table 1 and Table 2 list conventions that are used throughout this guide.
Table 1 Notice Icons
Icon Notice Type Description
Information note Information that describes important features or
instructions
Caution Information that alerts you to potential loss of data or
potential damage to an application, system, or device
Convention Description
Screen displays This typeface represents information as it appears on the
screen.
Syntax The word syntax means that you must evaluate the syntax
provided and then supply the appropriate values for the
placeholders that appear in angle brackets. Example:
To enable RIPIP, use the following syntax:
SETDefault !<port> -RIPIP CONTrol =
Listen
In this example, you must supply a port number for <port>.
Commands The word command means that you must enter the
command exactly as shown and then press Return or Enter.
Commands appear in bold. Example:
To remove the IP address, enter the following command:
SETDefault !0 -IP NETaddr = 0.0.0.0
The words enter
and type
When you see the word enter in this guide, you must type
something, and then press Return or Enter. Do not press
Return or Enter when an instruction simply says type.
xCH PTER : BOUT THIS GUIDE
Year 2000 Compliance For information on Year 2000 compliance and 3Com products, visit the 3Com
Year 2000 Web page:
http://www.3com.com/products/yr2000.html
Keyboard key names If you must press two or more keys simultaneously, the key
names are linked with a plus sign (+). Example:
Press Ctrl+ lt+Del
Words in italics Italics are used to:
■Emphasize a point.
■Denote a new term at the place where it is defined in the
text.
■Identify menu names, menu commands, and software
button names. Examples:
From the Help menu, select Contents.
Click OK.
Convention Description
1INTRODUCING SECURITY
This chapter explains how security works and what functions it performs. It also
provides reference information on pre-defined user groups, all permissions
and permission definitions.
Introduction The organization of this guide follows the concepts and steps required to set up
security. Follow the steps in this guide exactly to achieve the best results and
ensure the fewest problems.
fter setting up the server and adding users, use the security module. Security
works with the existing trustee hierarchy (server supervisors, account supervisors,
administrators, managers and users) and allows you to specify permissions for
individuals (users), accounts and groups.
The Nature of Objects Documents are objects that are stored in the fax server that may be accessed by
users for faxing. Cover pages, telephone lists and attachments are objects. User
profiles and modems are also objects.
Permissions and Objects
Permissions determine who can do what to each object.
The security permissions for server supervisors are fixed. You cannot change the
permissions nor delete the user group. This ensures that the server always has
someone that can work with users, Server Setup and Security permissions.
When the server supervisor creates a new user, the user is assigned to an account
under an account manager by the server supervisor. Once assigned to an account,
the server supervisor assigns some control over the user to the account supervisor.
Functions of Security
Security allows you to:
■Create accounts for users and objects (such as modems, cover pages and
phonebooks)
■Create Groups of users and objects
■Set the permissions owned by users, user accounts and user groups, to access
specific objects and object groups.
Some examples of permissions to access a modem include:
■Monitor the status of the modem
■Reset the modem
■Pause/Resume modem activity
1-2 CH PTER 1: INTRODUCING SECURITY
complete description of all possible permissions appears in the Security Objects
and Permissions section later in this chapter.
permission can be:
■Grantedyou can do the action
■Deniedyou cannot do the action
■Inheritedyou can or cannot do the action based on the permissions defined
for your group
■Irrevocableyou can do the action and the permission cannot be denied.
To learn more about the types of permissions, see Icon ListPermission Icons on
page 1-4.
Accounts n account does for CommWorks IP Fax Solutions roughly what a domain
does for Windows NT. Here are some attributes of accounts:
■Each account contains one or more users
■Every user belongs to one account
■Users have more rights to things that belong to their own account, than they
do to things that belong to other accounts. For example, a user might have
read-access to a public phonebook created by another user who belongs to the
same account, but would have no access to phonebooks created by users who
belong to a different account.
■Each account has its own administrator. dministrators have all-powerful
privileges to things (e.g. end-users and fax-jobs) which belong to their own
account, but no privileges to things that belong to another account.
Groups Setting up and managing security is easier when objects and users are grouped.
Create groups of users to assign similar permissions. For example, you might have
a Sales User group that has permission to use the same fax port device.
Create groups of objects to assign users similar permissions to use tham. For
example, a subset of modems called Sales might be accessable only by members
of the Sales User group.
Positive and Negative
Security Permissions
Grant permission to do something (positive) or deny permission to do something
(negative). The following is an example of a negative permission:
ssume that All Fax Users have permission to use and monitor fax port
number 2. Sales users are to use this port, but are not to monitor it. In this
Security Glossary 1-3
case, simply remove permission from the Sales User group to deny them
access to monitoring feature of fax port 2. ll other user groups, except
those belonging to the sub-group Sales User, can still monitor the modem.
This illustrates that user groups with similar permissions can be modified, allowing
greater control.
Security Glossary Irrevocable Permission permission that is granted to users because they
belong to a pre-defined group with permissions that cannot be changed. The
server supervisor, account supervisors, CommWorks IP Fax Solutions manager,
CommWorks IP Fax user and ssistant groups all have irrevocable permissions.
Default Permission permission that is granted to users because they belong
to a pre-defined group with the permissions. The difference between default
permissions and irrevocable permissions is that you can change Default
Permissions.
Owned By Self ny object that users can create or is owned by them has a
group labeled Owned By Self. This group gives the creator or owner of an
object more permissions for objects they own than for objects that are owned by
other people. Some objects that users create are faxes, attachments and cover
pages. Some objects users own are received faxes and their user profile.
MemberEach group of users or objects can have members. Members are
individuals or sub-groups that belong to a group.
ListUsers with the list permission can see that the object or user exists, although
they may not be able to use it. Generally, the user or User group must have this
permission before they are granted another permission for the object. For
example, a user that has the Use ttachment permission without the List
ttachment permission will never see the attachment to select it; therefore, the
user cannot use the attachment.
Account # Every user belongs to one account. ccounts are named using
account numbers ( ccount #s). The Account # to which each user belongs is
displayed in the User Properties dialog. Properties for these ccount #s are also
1-4 CH PTER 1: INTRODUCING SECURITY
set up here. There are two states of an ccount # in reference to a user. The
ccount # is either ctive or Forwarded.
Table 1-1 Icon ListObject Icons
Table 1-2 Icon ListPermission Icons
Adding Members to
Pre-Defined User Groups
There are six pre-defined user groups; server supervisors, account supervisors,
managers, Fax dministrators, and CommWorks IP Fax users.
Use the Security module to add, authenticate and define new users.
Assistants also have irrevoca le permissions, however, since the assistant's
permissions depend on another users permissions the assistant user level is not
listed as a pre-defined User group. Assistants have the same permissions to fax
jo s as the user they assist.
Icon Name Icon Name
Server Modems
Attachments Phonebooks
Cover Pages User Profiles
Account #’s Server Setup
Fax Jobs Users
Folders
Icon Name Icon Name
Granted permission
that was inherited.
Denied permission
that was inherited.
Granted permission
that was explicitly
given.
Denied permission
that was explicitly
refused.
Granted permission
that cannot be
denied.
Security Glossary 1-5
If you are satisfied with the pre-defined User groups and their permissions, you
may not need to use this security module at all (except to add new users). For
more information on the permissions for pre-defined groups, see the following
section, Pre-Defined User Groups.
Pre-Defined User Groups There are six pre-defined User groups with default permissions. You cannot
remove any of the pre-defined groups or change the irrevocable permissions.
However, you can change the default permissions for any pre-defined User group.
The only users without default permissions (they only have irrevocable
permissions) are server supervisors, account supervisors and ssistants.
ssistants can perform the same actions on fax jobs as the person they assist. They
are not included in security because their permissions are completely dependent
on the person they assist.
Pre-defined User groups provide the structure for the security module. This section
discusses the pre-defined User groups and explains their default and irrevocable
permissions.
If you want to add and remove members for the pre-defined User groups, you can
do so using the User Properties dialog.
In addition to the pre-defined groups and their permissions, you can add individual
members to sub-groups and set up permissions for the sub-groups to meet your
company specific requirements. For more information on sub-groups, see Chapter
View/Edit Server SetupDisplay and change the Server Setup dialog and all its
options. later in this guide.
Irrevocable Permissions
Members that belong to the following pre-defined groups have certain irrevocable
permissions:
■Server Supervisors
■ccount Supervisors
■CommWorks IP Fax Managers
■CommWorks IP Fax Users
■ssistants
Irrevocable permissions cannot be changed.
Groups
Server Supervisors Members of this group have all irrevocable permissions for
all objects, including:
■dd Users
■Control server set up
■Set up security
1-6 CH PTER 1: INTRODUCING SECURITY
Server supervisors cannot create fax jo s unless they also elong the Fax Users
group.
Account Supervisors ccount supervisors are created to provide added security
for individuals who need it. Defined properties of accounts might prevent server
supervisors (who create users) from viewing faxes, which are created by users in a
specific account.
The account structure supports three scenarios:
1Non-ISP and non-VFN (identical to previous versions of CommWorks IP Fax)
One company owns the fax server, and all users of the server are employees of
that company. In this case, you might have just one account (i.e. the default
 ccount #1). ll users belong to the one account and the server supervisor
might be the same person as the account administrator.
2One ISP with several corporate clients
In this new scenario, the server is owned by an ISP. The ISP has several clients. Each
client is a corporation with several users.
3The server supervisor is an employee of the ISP and is able to create new accounts
(i.e. add new corporate clients to the ISP's server). The server supervisor need not
be an administrator in these new accounts. Therefore, the server supervisor would
not need to view faxes owned by the various corporate client-accounts.
4The account administrator for each account would be an employee of each
corporate client. The account administrator would therefore be able to administer
faxes, which are owned by that corporation, and able to administer the users
which are employees of that corporation. Each account administrator has no
authority over things, which belong to other accounts, nor authority over the
global Server Setup settings. These would be controlled by the server supervisor.
Each account administrator would also be responsible for adding new users to
their own accounts. It is important that this job of adding extra users to the
account should belong to the account administrator (an employee of the
corporate client), and not to the server supervisor (an employee of the ISP).
5One ISP with many individual (home/end-User) clients
This scenario is similar to 2), except that each account contains only end-user.
CommWorks IP Fax Managers Members of this group have all irrevocable
permissions for all objects that are owned by the users that they manage,
including:
■Fax jobs
■ttachments
■Cover pages
■Phonebooks
■Folders
■User profile definition
Security Glossary 1-7
CommWorks IP Fax Users Members of this group have irrevocable permissions
to create fax jobs. You must belong to this group to create fax jobs.
Assistants Members of this group can do the same actions to fax jobs as the
person they assist.
Default Object Permissions
This section lists the permissions, by object, which all users have by default. For
more information on what each permission means, see Permission Definitions by
Object later in this chapter.
All Attachments ll users can List, View and Use attachments. Users have all
permissions to their own attachments ( ll ttachments Owned By Self).
Although network attachments are controlled here, attachments saved into
network su folders are controlled y the Folder Permissions.
All Cover Pages ll users can List, View and Use cover pages. Users have all
permissions to their own cover pages ( ll Cover Pages Owned By Self).
All Fax Jobs ll users can have their faxes paused for review by their manager
when defined on the server ( uthorize Send). Users have all permissions to their
own fax jobs ( ll Fax Jobs Owned By Self).
All Folders ll users can list the folder as well as view faxes, add faxes and
delete faxes from a folder. Users have all permissions to their own folders ( ll
Folders Owned By Self).
Attachments that are saved into network su folders are controlled here instead of
using Attachment Permissions.
All Phonebooks ll users can list and send a fax to a phonebook (either the
entire phonebook or a phonebook recipient). ll users can also view, edit, add and
delete phonebook recipients. Users have all permissions to their own phonebooks
( ll Phonebooks Owned By Self).
All User Pro iles Users have no default permissions to ll user Profiles.
However, users can list and view their own user profile.
Server Setup Users have no default permissions to Server Setup.
All 'Objects' Owned By Sel For each object, that users can create or own
there is a pre-defined object group:
■ll ttachments Owned by 'Self'
■ll Cover Pages Owned by 'Self'
■ll Fax Jobs Owned by 'Self'
■ll Folders Owned by 'Self'
■ll Phonebooks Owned by 'Self'
1- CH PTER 1: INTRODUCING SECURITY
■User Profile Owned by 'Self'
This group allows the creator of an object additional permissions for it. You can
change these permissions as needed. For more information on the default
permissions users have for objects Owned By Self, see the previous section. For an
example of how to change permissions on an Owned by Self group, see Chapter 3
Security Permission Examples.
Security Objects and
Permissions
The following lists each server object and the permissions you can set up for it. For
each object type, you can have both groups and individual objects with their own
security permissions.
You can use this list when planning the type of security your company requires.
Permission Dependencies
Some permissions depend on other granted permissions before they can work. If
you have a permission to use, edit or remove something, you require the
appropriate List Permission before you can do so. The List Permission allows you to
see that the object exists. For example, if you can Use all cover pages, but you do
not have the List Permission for cover pages, there will never be a cover page
visible to select.
nother dependency appears when you want to view or change a dialog that is
accessed from the User Properties dialog, such as User Preferences. You cannot
access the User Properties dialog without the granted permission to View.
Permission Definitions by Object
This section lists actions that can be taken on objects and provides a brief
definition. Permission is required before the action can be carried out.
Attachment Permissions
Attachment Permissions control attachments saved to the network folder. If the
Attachment is saved to a network su folder, you must use the Folder Permissions
to control access.
Delete ttachmentRemove an ttachment from a network location using the
ttachments window.
List ttachmentSee the ttachment in the list of existing attachments from the
ttachments window and Fax Send dialog. Other ttachment Permissions are only
useful when you have the List Permission.
Use ttachmentSend the ttachment with outbound faxes on the Fax Send
dialog.
View ttachmentView the ttachment contents from the ttachments window.
Cover Page Permissions Delete Cover PageRemove a cover page from the
server location using the Fax Send dialog.
Security Glossary 1-9
List Cover PageSee that the cover page exists in the list of cover pages using the
Fax Send dialog. Other Cover Page Permissions are only useful when you have the
List Permission.
Use Cover PageSend the Cover Page with outbound faxes from the Fax Send
dialog.
View Cover PageView the Cover Page contents using the Cover Page Editor.
Fax Job Permissions
Authorize SendFaxes are automatically paused by the server if the Activate
Manager Send option is enabled on the Server Dialing dialog and the user has a
manager defined in the Manager field on the User Properties dialog.
Copy to Another UserSend another user a copy of a received fax using the
Move to User dialog.
Delete Fax JobRemove a fax from the Send Log or Receive Log.
List Fax JobsSee that the fax exists from the Send Log or Receive Log. Other
Fax Job Permissions are only useful when you have the List Permission.
Move to Another UserMove the fax to another user by changing the fax's
owner or routing a received fax to another user.
Pause Fax JobPause a fax from the Send Log.
Purge Fax JobPermanently remove faxes marked as deleted from the Send Log
or Receive Log.
ResubmitChange and resend a fax from the Send Log or Receive Log.
Unpause (Resume) Fax JobResume a fax that is currently paused from the
Send Log.
View All PagesView all pages of a fax in the Fax Image Viewer.
View First PageView the first page of a fax in the Fax Image Viewer.
Folder Permissions
Folder Permissions also affect attachments when the attachment is saved into a
network su folder. Only attachments saved into the main network folder are
controlled y Attachment Permissions.
Add To Folder dd a fax to a folder in the Send Log or Receive Log window.
Delete Entire FolderRemove a folder and its contents from the Folder menu.
Delete From FolderRemove a fax from a folder from the Folder menu.
List FolderSee that the folder exists from the Send or Receive Logs. Other
Folder Permissions are only useful when you have the List Permission.
1-10 CH PTER 1: INTRODUCING SECURITY
Rename FolderChange the folder's name from the Folder Properties dialog.
View From FolderView a fax from the folder in the Fax Image Viewer.
Phonebook Permissions
Add to Phonebook dd a recipient to a phonebook or phonebook group on
the Phonebooks window.
Delete Entire PhonebookRemove the phonebook and all its contents from the
Phonebook window. This permission also allows you to Pack and Reindex the
phonebook, purging all recipient's marked as deleted and allowing the program to
read the phonebook faster.
Delete Phonebook ItemRemove a recipient from the phonebook or
phonebook group from the Phonebook window.
Edit ContentsChange the recipient information for the phonebook or
phonebook group using the Edit Recipient dialog.
List PhonebookSee that the phonebook exists in the Phonebook window and
Fax Send dialog. Other Phonebook Permissions are only useful when you have the
List Permission.
Rename PhonebookChange the name of the phonebook or phonebook
group in the Phonebook window.
Send To PhonebookUse the phonebook, phonebook group or individual
phonebook recipients when addressing faxes using the Fax Send dialog.
View ContentsView the detailed recipient information from the phonebook or
phonebook group using the Edit Recipient dialog.
User Profile Permissions
Delete UserRemove a user from the server from the Security Setup window.
Edit Pre-Defined GroupsChange someone's user level, meaning to add or
remove the user to or from the following pre-defined groups:
■Server Supervisor
■ccount Supervisor
■Fax Manager
■Fax dministrator
■Fax User
This permission also allows you to change a user's manager and define an
ssistant.
Edit User PreferencesChange the preferences for the user from the User
Preferences dialog.
Edit User ProfileChange the fields on the User Properties dialog for the user.

Other 3Com Software manuals

3Com 3CR15600 - Enterprise Management Suite User manual

3Com

3Com 3CR15600 - Enterprise Management Suite User manual

3Com NBX 100 Instruction Manual

3Com

3Com NBX 100 Instruction Manual

3Com 3CWXMUPA Instruction Manual

3Com

3Com 3CWXMUPA Instruction Manual

3Com CommWorks 5210 User manual

3Com

3Com CommWorks 5210 User manual

3Com 3C16120 - SuperStack 3 Server Load Balancer User manual

3Com

3Com 3C16120 - SuperStack 3 Server Load Balancer User manual

3Com NBX 100 Quick start guide

3Com

3Com NBX 100 Quick start guide

3Com 3C19250 - USB Ethernet Network Interface... User manual

3Com

3Com 3C19250 - USB Ethernet Network Interface... User manual

3Com 3CR15800 - Intelligent Management Center Enterprise... User manual

3Com

3Com 3CR15800 - Intelligent Management Center Enterprise... User manual

3Com H3C IMC STANDARD PLATFORM - User manual

3Com

3Com H3C IMC STANDARD PLATFORM - User manual

3Com Network HotSync User manual

3Com

3Com Network HotSync User manual

3Com OfficeConnect WX1200 User manual

3Com

3Com OfficeConnect WX1200 User manual

3Com pcXset - NBX - PC User manual

3Com

3Com pcXset - NBX - PC User manual

3Com Traffix Transcend Traffix Manager User manual

3Com

3Com Traffix Transcend Traffix Manager User manual

3Com SUPERSTACK 3 WEBCACHE 3000 User manual

3Com

3Com SUPERSTACK 3 WEBCACHE 3000 User manual

3Com 3C16120 - SuperStack 3 Server Load Balancer Instruction Manual

3Com

3Com 3C16120 - SuperStack 3 Server Load Balancer Instruction Manual

3Com 3CWXPGS - AirProtect RF Planning Tool User manual

3Com

3Com 3CWXPGS - AirProtect RF Planning Tool User manual

3Com SuperStack II 3300 FX User manual

3Com

3Com SuperStack II 3300 FX User manual

3Com 3C15500 - Network Director - PC User manual

3Com

3Com 3C15500 - Network Director - PC User manual

3Com TRANSCEND EM/NT 6.3 User manual

3Com

3Com TRANSCEND EM/NT 6.3 User manual

3Com IntelliJack NJ200 Manual

3Com

3Com IntelliJack NJ200 Manual

Popular Software manuals by other brands

Nintendo RVLRRFPE Instruction booklet

Nintendo

Nintendo RVLRRFPE Instruction booklet

MikroTik RouterOS v2.9 Reference manual

MikroTik

MikroTik RouterOS v2.9 Reference manual

SoundToys Native Effects V 4 Getting started

SoundToys

SoundToys Native Effects V 4 Getting started

AMX NSS-VOTE instruction manual

AMX

AMX NSS-VOTE instruction manual

Funk Software Proxy user guide

Funk Software

Funk Software Proxy user guide

Pitney Bowes GDI Printing System user guide

Pitney Bowes

Pitney Bowes GDI Printing System user guide

Clickfree C2N user guide

Clickfree

Clickfree C2N user guide

Avaya IP Office 4.0 installation manual

Avaya

Avaya IP Office 4.0 installation manual

Garmin Nuvi 755T - Automotive GPS Receiver Owner's manual supplement

Garmin

Garmin Nuvi 755T - Automotive GPS Receiver Owner's manual supplement

OfficeMate ExamWriter 7.3 Enhancements guide

OfficeMate

OfficeMate ExamWriter 7.3 Enhancements guide

Konica Minolta bizhub PRO 1051 Series user guide

Konica Minolta

Konica Minolta bizhub PRO 1051 Series user guide

Novell LINUX ENTERPRISE SERVER 10 SP2 - STARTUP GUIDE... Startup guide

Novell

Novell LINUX ENTERPRISE SERVER 10 SP2 - STARTUP GUIDE... Startup guide

Novell GROUPWISE 8 - WEBACCESS manual

Novell

Novell GROUPWISE 8 - WEBACCESS manual

Dell PowerConnect W-Airwave manual

Dell

Dell PowerConnect W-Airwave manual

Lucent Technologies Telephone User Interface Serenade Quick reference guide

Lucent Technologies

Lucent Technologies Telephone User Interface Serenade Quick reference guide

SanDisk FlashSoft Data management

SanDisk

SanDisk FlashSoft Data management

MACROMEDIA BREEZE 5 manual

MACROMEDIA

MACROMEDIA BREEZE 5 manual

SMART SMART Notebook SE installation guide

SMART

SMART SMART Notebook SE installation guide

manuals.online logo
manuals.online logoBrands
  • About & Mission
  • Contact us
  • Privacy Policy
  • Terms and Conditions

Copyright 2025 Manuals.Online. All Rights Reserved.