Cisco Cisco Security Agent for Cisco Unified MeetingPlace

Pagina di 10
2
Release Notes for Cisco Security Agent for Cisco Unified MeetingPlace Release 6.0(7)
OL-13469-01
  Introduction
Introduction
Cisco Security Agent for Cisco Unified MeetingPlace is a standalone Cisco Security Agent that is 
provided free of charge by Cisco Systems for use with Cisco Unified MeetingPlace installations that 
meet the requirements specified in the 
The standalone Cisco Security Agent provides: 
Intrusion detection and prevention for Cisco Unified MeetingPlace software.
Defense against previously unknown attacks because it does not require signatures, as antivirus 
software does.
Reduced downtime, attack propagation, and cleanup costs.
The agent provides Microsoft Windows platform security (host intrusion detection and prevention) that 
is based on a tested set of security rules known as a policy. The policy allows or denies specific system 
actions before system resources are accessed, based on the following criteria:
The resources being accessed.
The operation being invoked.
The process invoking the action.
This occurs transparently and does not greatly hinder overall system performance.
Version 6.0(7) of the standalone Cisco Security Agent for Cisco Unified MeetingPlace is compiled with 
Cisco Security Agent version 5.0.0, build 205.
Caution
Do not view Cisco Security Agent for Cisco Unified MeetingPlace as providing complete security for 
Cisco Unified MeetingPlace installations. Instead, view it as an additional line of defense that, when 
used correctly with other standard defenses such as antivirus software and firewalls, provides enhanced 
security. Cisco Security Agent for Cisco Unified MeetingPlace provides enhanced defense for many 
different Cisco Unified MeetingPlace installations and configurations, and therefore cannot enforce 
network access control rules, which block outbound or inbound network traffic, or act as a host-based 
firewall.
The best starting point for references to security and voice products is 
. We recommend the IP Telephony Security Operations Guide to 
Best Practices.
Requirements and Supported Software
See the applicable section, depending on the product: