Cisco Cisco Unified MeetingPlace Audio Server Installation Guide

Page of 217
Cisco MeetingServer 5.1 Installation Planning Guide  
 
21 
 
Cisco Systems 
                                  
March 2003 
Scheduled meetings are more secure than reservationless meetings. This is 
because reservationless meetings do not require a meeting password and are 
always displayed to everyone.  
Anyone who wants to enter a meeting must first provide the meeting ID. 
Whoever schedules the meeting may also require that attendees provide the 
correct password before being allowed to enter. Meetings can be restricted to 
invitees or to users with MeetingPlace user profiles. 
MeetingPlace can also announce the name of each attendee as that person 
enters the meeting; if someone enters who shouldn’t be there, that person can 
be dropped from the call. When sensitive information is being discussed, 
users can lock the meeting so that no one can enter without explicit permission.  
What Information is Available About Meetings? 
The MeetingPlace conference server accumulates historical information about 
meetings and associated resource usage. The system tracks details on meeting 
organizers, schedules, participants, meeting recordings, and outdialing activity. 
This information is retained in the MeetingPlace database and can be included 
in printed reports. 
How Do Different People Use MeetingPlace? 
MeetingPlace enables anyone to participate in telephone conferences. People 
outside your organization have the option of attending meetings over the 
phone as guests. Guest users have restricted privileges and typically cannot 
schedule meetings, start recording, or initiate outdials in a meeting. 
For users inside your organization, you should set up user profiles. User 
profiles contain their privileges (such as scheduling, recording, and 
outdialing) and user level. Each user level denotes a class of user: 
 
End users
Most people are end users. These users typically attend 
meetings, access MeetingNotes, and set up their own meetings. 
 
Contacts
Contacts are administrators who may support the system or the 
user community at a departmental level. Contacts can schedule and 
manage meetings on behalf of their specific set of users.  
 
Attendants
Attendants are administrators who support all users in the 
system. Attendants can schedule, control, and manage meetings on behalf 
of all users. Attendants may also create and delete new user profiles, lock 
and unlock profiles, run reports, monitor capacity, view alarms and end 
meetings currently in session if a system manager has given them these 
privileges.