Post installation and upgrades
Cisco TMS Secure Server Configuration Guide 13.0
Page 33 of 34
Post installation and upgrades
Cisco TMS upgrades
Due to the Cisco TMS application and its components being removed and reinstalled during upgrades,
it is necessary to repeat some of the hardening procedures. Below is a reference to those sections
that must be reapplied.
Assign file ACLs for Cisco TMS directories
Configure Cisco TMS Services to use Service Account
Set proper authentication methods
Delete unused application mappings
Optional - Configure Cisco TMS to use HTTPS
Optional - Remove XAPDLL
Optional - Remove Polycom Endpoint support
Continued monitoring
It is important that the server’s logs be continually audited to monitor for undesired behavior or
attempts to break into the server. The Windows Event Viewer can be used to monitor the security
audits enabled, and the IIS logs can be used for additional information regarding access to the
website. The IIS Logs can grow large on a busy website and should be periodically purged to
conserve disk space.
Up to date patching
It is important that administrators keep their servers up to date to ensure the latest fixes are applied to
their installation. You can subscribe to automatically receive notifications from Microsoft at
http://www.microsoft.com/technet/Security/bulletin/notify.mspx
.