2.1.1 Server Selection and Installation
See the
ZENworks Endpoint Security Management Installation Guide
instructions.
2.1.2 Server Maintenance
It is recommended that regular disk cleanup tasks be configured to run on this server to remove
temporary files from the
generate an inordinate amount of temporary files that needlessly consume disk space.
2.1.3 Upgrading the Software
To upgrade your software from one release to another, you must uninstall the old release and install
the new release. Complete instructions are provided in "Upgrading" in the
Security Management Installation
2.1.4 Uninstall
To uninstall the Policy Distribution Service, use the Add/Remove Programs function in the
Windows Control Panel, or run the installation again from the ZENworks Endpoint Security
Management installation CD.
2.2 Securing Server Access
The following sections contain information to help you secure access to your ZENworks Endpoint
Security Management server:
Section 2.2.1, "Physical Access Control," on page 18
Section 2.2.2, "Network Access Control," on page 19
Section 2.2.3, "High Availability," on page 19
2.2.1 Physical Access Control
Physical access to the Distribution Service Server should be controlled to prevent access by
unauthorized parties. Measures taken should be appropriate to the risks involved. There are multiple
available standards and guidelines available, including NIST recommendations, HIPAA
requirements, ISO/IEC 17799, and less formal collections of recommendations such as CISSP or
SANS guidelines. Even when a given regulatory frameworks is not applicable, it may still act as a
valuable resource and planning guide.
Likewise, Disaster Recovery and Business Continuity mechanisms to protect the Distribution Server
should be put in place to protect the server if an organizational risk assessment identifies a need for
such steps. The mechanisms best used will depend on the specifics of the organization and its
desired risk profile, and cannot be described in advance. The same standards and guidelines sources
listed above can be helpful in this decision as well.
18
ZENworks Endpoint Security Management Administration Guide
folder. Under extreme load conditions, Windows can
Windows\temp
Guide.
for selection and installation
ZENworks Endpoint
Need help?
Do you have a question about the ZENWORKS ENDPOINT SECURITY MANAGEMENT 3.5 - ADMINISTRATION and is the answer not in the manual?
Questions and answers