Cisco Cisco Process Orchestrator 3.0 Installation Guide

Page of 62
3-3
Cisco Process Orchestrator Installation Guide
OL-24931-02
Chapter 3      Configuring Cisco Process Orchestrator
  Enabling Data Execution Prevention (DEP)
Enabling Data Execution Prevention (DEP)
The Data Execution Prevention (DEP) feature in Microsoft Windows is the recommended tool customers 
should use to secure their underlying hardware and operating system. 
Hardware-enforced DEP detects code that is running from these locations and raises an exception when 
execution occurs. Software-enforced DEP can help prevent malicious code from taking advantage of ex-
ception-handling mechanisms in Windows.
Enabling DEP in Windows 2008 and Windows 2012
To enable the DEP
Step 1
Choose Start > All Programs > Control Panel > System.
The System panel displays. 
Step 2
Click Advanced system settings to continue. 
The System Properties dialog box displays. 
Step 3
Under Performance, click Settings.
Step 4
Click the Data Execution Prevention tab to continue. 
Step 5
Check the Turn on DEP for all programs and services except those I select to select check box.
Step 6
After adding the programs, click OK to complete.
Recommended Windows Security Hardening Policy 
This section describes the steps required to allow a hardened windows system using Microsoft Windows 
recommended hardening guidelines to properly run Cisco Process Orchestrator, as well as to make 
additional changes to Process Orchestrator to harden it's configuration. If your system has additional 
hardening steps further changes may be required to get Process Orchestrator to work.
For hardening Windows Server 2008, the Best Practices Analyzer (BPA) server management tool, which 
is installed by default on all editions of Windows Server 2008 R2, except the Server Core installation 
option, can be used. 
This server management tool helps administrators reduce best practice violations by scanning one or 
more roles that are installed on Windows Server 2008 R2, and reporting best practice violations to the 
administrator. 
For additional information on recommended Windows OS hardening guidelines, see