Cisco Tms Upgrades; Continued Monitoring; Up To Date Patching - Cisco TELEPRESENCE MANAGEMENT SUITE SECURE SERVER - CONFIGURATION GUIDE 13.0 Configuration Manual

Hardening windows server 2003 for cisco tms 13.0
Hide thumbs Also See for TELEPRESENCE MANAGEMENT SUITE SECURE SERVER - CONFIGURATION GUIDE 13.0:
Table of Contents

Advertisement

Post installation and upgrades

Cisco TMS upgrades

Due to the Cisco TMS application and its components being removed and reinstalled during upgrades,
it is necessary to repeat some of the hardening procedures. Below is a reference to those sections
that must be reapplied.
Assign file ACLs for Cisco TMS directories
Configure Cisco TMS Services to use Service Account
Set proper authentication methods
Delete unused application mappings
Optional - Configure Cisco TMS to use HTTPS
Optional - Remove XAPDLL
Optional - Remove Polycom Endpoint support

Continued monitoring

It is important that the server's logs be continually audited to monitor for undesired behavior or
attempts to break into the server. The Windows Event Viewer can be used to monitor the security
audits enabled, and the IIS logs can be used for additional information regarding access to the
website. The IIS Logs can grow large on a busy website and should be periodically purged to
conserve disk space.

Up to date patching

It is important that administrators keep their servers up to date to ensure the latest fixes are applied to
their installation. You can subscribe to automatically receive notifications from Microsoft at
http://www.microsoft.com/technet/Security/bulletin/notify.mspx.
Cisco TMS Secure Server Configuration Guide 13.0
Post installation and upgrades
Page 33 of 34

Advertisement

Table of Contents
loading

This manual is also suitable for:

Telepresence management suite secure server

Table of Contents