server console commands. Topics in this section describe common administrative tasks for administering a
Starting and stopping the server
The IBM Lotus Notes
Traveler server and the HTTP server automatically start if you accept the default settings during installation. Use the commands in this topic to manually start or stop the Lotus Notes
Assigning device preferences and security settings to devices
There are different ways to assign settings that determine how users work with the IBM Lotus Notes
Traveler server. You can use the built-in set of default device preferences and security settings that Lotus Notes
Traveler provides, which is simpler. Or you can create a Lotus Notes
Traveler policy settings document, which provides greater flexibility and control but is more complex to configure.
If a mobile device is lost or stolen, an administrator can issue a remote wipe command to remove all sensitive data from the device. You can remove the IBM Lotus Notes
Traveler application and data from the device and, depending on the device, restore the device to the factory default settings.
Controlling access to Lotus Notes Traveler
When a user leaves the company or a device is lost or stolen, you must remove or restrict access to the IBM Lotus Notes
Traveler server. This section covers methods for removing and restricting access.
Deleting a user from Lotus Notes Traveler
An administrator can remove old or invalid users from the IBM Lotus Notes
Traveler administrator UI and database. This should only be done for users where access is already restricted using a Lotus Notes
Traveler or Domino
server access list, or who are no longer listed in the Domino
Viewing user and device information
There are four views an administrator can access that provide useful information. These views include which users have registered with the IBM Lotus Notes
Traveler server, device security policy compliance status, remote wipe status, connection status, and build level. Use the steps in this topic to access user and device information.
Using the LotusTraveler.nsf database
When using the LotusTraveler.nsf
database, there are several important factors to be aware of.
This topic provides a detailed description of the IBM Lotus Notes
Traveler console commands.
Enabling syncing of read or unread changes
Unread replication is enabled for each user automatically by the Lotus Notes
Traveler server so that unread marks sync correctly with the device. This section explains how to activate unread replication manually using the Domino
Adding external calendars to your Lotus Notes calendar
You can add an external calendar to your Notes
® calendar and select the View this calendar when offline or on a mobile device
option. IBM Lotus Notes
Traveler can then sync the external calendar events to your device that have been saved for offline or mobile viewing.
Repeated crash protection
When certain Notes
documents are corrupted or contain non-standard content, they can cause the Lotus Notes Traveler server to repeatedly crash as it tries to process these documents. A repeating crash prevention feature exists to help minimize Lotus Notes
Traveler server outage in these instances.
Defragging the database for improved performance
As Lotus Notes
Traveler installations become larger and run for extended periods of time, the internal database will grow in size. This can affect system performance. You can defrag the database to compact and optimize its performance.
Address encoding for Apple devices
Apple devices cannot support the full range of acceptable Domino mail addresses
. To allow the Apple device to properly handle non-standard internet address formats, Lotus Notes
Traveler has a feature that encodes them into internet addresses supported by Apple devices.
Forcing data limits for end users
For Lotus Notes
Traveler 220.127.116.11 and later releases, administrators can enforce data limits for all users. Once set, if a user selects No Limit
for Calendar and Mail data, instead of receiving all data for a particular application type, they will only receive data that passes the Administrator defined filter limit.
The usage log shows every sync and device command that the system performs on behalf of mobile users.
Confirming external recipients on Android devices
For Android devices, you can choose to prompt the user to confirm the sending of mail to external recipients. This provides an extra step to help prevent the unintentional sending of mail outside of your organization.