Cisco Cisco Unified MeetingPlace Audio Server Guida All'Installazione

Pagina di 248
2-10  About Cisco MeetingPlace 
Cisco MeetingPlace Audio Server Installation Planning Guide
February 27, 2004
If possible, automate the process of adding and deleting user profiles by 
installing MeetingPlace Directory Services Gateway or manually scripting 
these actions from your organization’s human resources database. Either 
action ensures that terminated employees’ profiles are deleted or 
deactivated. Your MeetingPlace support organization can provide further 
information on both these options.
If you cannot automate the profile process, write and strictly follow a 
program of regular, frequent additions and deletions based on information 
from your organization’s human resources group. It is particularly 
important that user profiles for terminated employees be quickly 
deactivated or deleted.
Determine a system of profile numbers that are not easy to guess, but also 
not difficult for your users to remember. For example, because telephone 
extensions can often be easily guessed, add a prefix. Employee IDs can 
also be used as long as they are not vulnerable to a random attack. For 
security purposes, we recommend selecting profile numbers that include at 
least seven digits.
Make sure the default profile password cannot be easily guessed, and be 
sure that users change it quickly. Run regular periodic reports to determine 
which profile passwords have not been changed from the default and 
respond by either contacting the user, changing the password, or 
deactivating or deleting the profile.
Write and communicate a policy regarding profile passwords so that users 
do not select trivial passwords. For example, have users refrain from 
creating passwords that contain repeated or consecutive digits.
Provide tips to the end-user community regarding how to secure their 
meetings. Meeting security features include unique meeting IDs, 
non-trivial meeting IDs, announced entry, meeting passwords, attendance 
restrictions, locking meetings, deleting unwanted participants, and roll 
call.
Write and implement a policy of regular system monitoring for undesired 
access. Reports and alarms are the primary instruments for such 
monitoring.