Cisco Cisco Unified MeetingPlace Audio Server Installation Guide

Page of 217
Cisco MeetingServer 5.1 Installation Planning Guide  
 
26 
 
Cisco Systems 
                                  
March 2003 
 
Keep the number of user profiles with system manager access to a 
minimum. Use longer IDs and passwords for these accounts and change 
them more frequently.  
 
If possible, automate the process of adding and deleting user profiles by 
installing MeetingPlace Directory Services or by manually scripting 
these actions from your Human Resources’ database. Either of these 
actions will ensure that terminated employees’ profiles are deleted or 
deactivated. Your MeetingPlace support organization can provide further 
information on both these options. 
 
If you cannot automate the profile process, write and strictly follow a 
program of regular, frequent additions and deletions based upon 
information from your Human Resources group. It is particularly 
important that user profiles for terminated employees be quickly 
deactivated or deleted. 
 
Select a system of profile numbers that are not easy to guess, but also not 
difficult for your users to remember. Telephone extensions on their own 
can often be easily guessed; therefore, consider adding a prefix. 
Employee IDs can also be used as long as they are not vulnerable to a 
random attack. For security purposes, we recommend selecting profile 
numbers that are at least seven digits in length. 
 
Make sure the default profile password cannot be easily guessed, and be 
sure that users change it quickly. Run regular periodic reports to 
determine which profile passwords have not been changed from the 
default and respond by either contacting the user, changing the 
password, or deactivating or deleting the profile. 
 
Write and communicate a policy regarding profile passwords so that 
users don’t select trivial passwords, such as ones that contain repeated or 
consecutive digits. 
 
Provide tips to the end user community regarding how to secure their 
meetings. Meeting security features include unique meeting IDs, non-
trivial meeting IDs, announced entry, meeting passwords, attendance 
restrictions, locking meetings, deleting unwanted participants, and roll call. 
 
Write and implement a policy of regular system monitoring for undesired 
access. Reports and alarms are the primary instruments for such 
monitoring. 
 
Plan your response in case of different types of unauthorized access. In 
particular, determine any changes you will make to MeetingPlace security 
parameters or other system access such as changing phone numbers, as 
well as procedural changes you might make in your organization.