Managing the Microsoft CRM 3.0 application in IAG SP2

Applies To: Intelligent Application Gateway (IAG)

Application-specific settings

This topic describes how you can prevent users from performing the following operations unless their computer meets the defined security policy requirements when connecting to Whale Communications Intelligent Application Gateway (IAG) 2007:

  • Exporting to Excel

  • Printing

  • Adding attachments

  • Accessing the Settings area

Users that are blocked are notified accordingly.

In order to enable this option, once you finish adding the application to the trunk, you need to define the security policy requirements using a dedicated endpoint policy: “Microsoft CRM 3 Enhanced Security”. By default, the value of the policy is “True”, and it does not prevent users from performing the operations listed above from any endpoint computer. If required, change the policy to comply with your corporate policy, as described here.

To prevent enhanced security operations from non-compliantendpoints

  1. In the IAG Configuration console, access the Application Properties dialog box and click Manage Policies.

  2. In the Manage Policies and Expressions dialog box, under the Policies group, select the Microsoft CRM 3 Enhanced Security policy, and then click Edit Policy.

  3. To define the prerequisites that endpoint computers must meet in order to enable Enhanced Security operations, remove the default values from the relevant platforms, and assign the appropriate value to the platform-specific policies. For details, see Managing IAG client endpoint policies.

  4. On the toolbar of the Configuration console, click the Activate Configuration icon, and then on the Activate Configuration dialog box, click Activate.

    When the configuration is activated, the message "IAG configuration activated successfully" appears.

    End users accessing the Microsoft CRM 3.0 application from a non-compliant client endpoint will not be able to perform the enhanced security operations.