Security and information assurance recommendations – CTI Products EXB-IP Ethernet System Extender User Manual

Page 32

Advertising
background image

CTI Products, Inc.

EXB-IP User Guide

IP Configuration – EXB Config

32

S

ECURITY AND

I

NFORMATION

A

SSURANCE

R

ECOMMENDATIONS

Review these recommendations before installation and follow them during installation and operation:

1. Software Installation Locations

Install the EXB Config software in default program directory recommended by Installshield.

2. Use the EXB-IP 8000 UDP ports for MSI RNIs as described in this manual.

3. For all software, network and device configuration, additionally take into consideration commercially

accepted practices, industry standards and the standards for your organization.

4. Do not save user files or system configuration files in the program directory.

5. Save system configuration files to a directory that requires Administrator rights so that users cannot delete

or edit the configuration files.

6. Always run the configuration software with the lowest permission set possible.

Note: The EXB Config software must be run with Administrator rights.

7. When configuring a system, do not enter Sensitive or Confidential information into the system

configuration files.

8. The configuration files generated by EXB Config Server are not backed up as part of the ASTRO® 25

Back UP & Restore (BAR) solution. Follow the Backup & Recovery procedures as listed in this manual.

9. Follow the applicable Backup & Recovery procedures for your system, PCs, and operating systems as

defined by your organization, the hardware and software vendors, and commercially acceptable practices.

10. Limit access to PCs, IP networks, EXB-IP units and MCN networks, both physically and through

appropriate restrictions in routers and switches

11. Use strong passwords where applicable.

12. Follow Motorola's and your organization's recommendations on security and Information Assurance.

13. Use the appropriate Windows Hardening Kits for PCs in your system.

14. Use anti-virus and anti-malware packages on PCs in your system.

15. Install appropriate security patches for installed software and operating system on PCs in your system.

Advertising