How does IM Security populate the Server Management list? Parent topic

IM Security populates the Server Management list by:
  • Querying the Global Catalog (GC) or local cache GC for the available Lync Servers in a forest
  • Using the currently logged on user account to connect the servers in a forest
  • Checking the user account's permission to access remote servers
    If the user account is allowed to access a remote server, IM Security then verifies whether the WMI namespaceroot\TrendMicro\IMSecurity exists on that server. If the namespace exists, IM Security concludes that the remote server has Lync Server and IM Security installed.
If all of the above conditions are satisfied, IM Security includes the server in the Server Management list.