Cisco Cisco Process Orchestrator 3.3 Maintenance Manual

Page of 11
This document contains information to help you secure your Cisco Process Orchestrator 
installation by adjusting at various levels of your infrastructure. This guide discusses on the 
various points of   vulnerability in the Process Orchestrator, from your Windows
®
 servers to the 
applications, resources used, and explains the best practices that can be employed to make your 
installation more secure. 
Note: Complying with these hardening guidelines does not guarantee the elimination of all  
security threats. However, by implementing these guidelines, you can achieve  
a higher-level of security and help manage unforeseen risks.  
This section describes the recommended hardening guidelines that are required to harden 
Windows system using Microsoft Windows to run the Process Orchestrator, and to make 
additional changes to harden its configuration. If your system has additional hardening steps, 
changes are required for the Process Orchestrator to work. 
For hardening Windows Server 2008 R2 and 2012, the Best Practices Analyzer (BPA) server 
management tool, is installed by default on all editions of Windows Server 2008 R2 and 
Windows Server 2012, except the Server Core installation option, can be used. 
The BPA server management tool helps administrator to reduce best practice violations by 
scanning one or more roles that are installed on your Windows Server and reports best practice 
violations to the administrator. 
For additional information on recommended Windows OS hardening guidelines, see 
. 
 
Applications that are not included with Windows Server 2008 R2 have a separate BPA for 
optimizing and hardening applications. These BPAs run on the Microsoft Baseline Configuration 
Analyzer (MBCA) application that maintains optimal system configuration by analyzing 
configurations of a system against a predefined set of best practices. 
  To download MBCA v2.0, click 
.