4.1.2 Server Maintenance
It is recommended that regular disk cleanup tasks be configured to run on this server to remove
temporary files out of the
generate an inordinate amount of temporary files that needlessly consume disk space.
4.1.3 Upgrading the Software
To upgrade your software from one release to another, you must uninstall the old release and install
the new release. Complete instructions are provided in "Upgrading" in the
Security Management Installation
4.1.4 Uninstall
To uninstall the Management Service, use the Add/Remove Programs function in the Windows
Control Panel.
To uninstall the Management Console (when run on a separate computer), use the Add/Remove
Programs function in the Windows Control Panel.
4.2 Securing Server Access
The following sections contain information to help you secure access to your ZENworks Endpoint
Security Management server:
Section 4.2.1, "Physical Access Control," on page 38
Section 4.2.2, "Network Access Control," on page 39
Section 4.2.3, "High Availability," on page 39
Section 4.2.4, "Running the Service," on page 39
4.2.1 Physical Access Control
Physical access to the Management Server should be controlled to prevent access by unauthorized
parties. Measures taken should be appropriate to the risks involved. There are multiple available
standards and guidelines available, including NIST recommendations, HIPAA requirements, ISO/
IEC 17799, and less formal collections of recommendations such as CISSP or SANS guidelines.
Even when a given regulatory frameworks is not applicable, it may still act as a valuable resource
and planning guide.
Disaster Recovery and Business Continuity mechanisms to protect the Management Server should
be put in place to protect the server if an organizational risk assessment identifies a need for such
steps. The mechanisms best used will depend on the specifics of the organization and its desired risk
profile, and cannot be described in advance. There are multiple available standards and guidelines
available, including NIST recommendations, HIPAA requirements, ISO/IEC 17799, and less formal
collections of recommendations such as CISSP or SANS guidelines.
38
ZENworks Endpoint Security Management Administration Guide
folder. Under extreme load conditions, Windows can
Windows\temp
Guide.
ZENworks Endpoint
Need help?
Do you have a question about the ZENWORKS ENDPOINT SECURITY MANAGEMENT 3.5 - ADMINISTRATION and is the answer not in the manual?