Office Communications Server 2007 R2 includes the following security enhancements

If you federate with enterprises that are on Office Communications Server 2007 and need to use audio/video between your enterprise and the federated enterprise, the port requirements will be those for the older version of the Edge Servers that are deployed. For example, the port ranges required for Office Communications Server 2007 must be implemented for both enterprises until the federated partner upgrades their edge to Office Communications Server 2007 R2. At that time, port requirements can be reviewed and reduced according to the new configuration.

A complete list and discussion of all new features in Office Communications Server 2007 R2 and Office Communicator 2007 R2 can be found in the Getting Starteddocumentation.

Trustworthy by Design

Office Communications Server 2007 R2 is designed and developed in compliance with the Trustworthy Computing Security Development Lifecycle (SDL), which is described at the Microsoft Web site: . The first step in creating a more secure unified communications system was to design threat models and test each feature as it was designed. Multiple security-related improvements were built in to the coding process and practices. Build-time tools detect buffer overruns and other potential security threats before the code is checked in to the final product. Of course, it is impossible to design against all unknown security threats. No system can guarantee complete security. However, because product development embraced secure design principles from the start, Office Communications Server 2007 R2 incorporates industry standard security technologies as a fundamental part of its architecture.

Trustworthy by Default

Network communications in Office Communications Server 2007 R2 are encrypted by default. By requiring all servers to use certificates and by using Kerberos authentication, TLS, Secure Real-Time Transport Protocol (SRTP), and other industry-standard encryption techniques, virtually all Office Communications Server 2007 R2 data is protected on the network. In addition, role-based setup makes it possible to deploy Office Communications Servers so that only the services, and the permissions related to those services, are installed as appropriate on each server role.

Trustworthy by Deployment

The Office Communications Server planning guide, deployment guides, migration guide, and this guide all document best practices and recommendations to help you determine and configure the optimal security levels for deployment and assess the risks of activating non-default options.