2 operator mode, 3 windows security updates, 4 network security – Quadrox WebCCTV Installation Manual User Manual

Page 61: Webcctv installation manual

Advertising
background image

WebCCTV Installation Manual

61


Version 4.4 Series

6.2.2

Operator mode

When logging in to the machine in Operator mode (Windows login, not the WebCCTV user
interface), the user can only see the local interface of WebCCTV. All other direct interaction
with the system is disabled. Nothing changes for remote access to WebCCTV.

Always leave WebCCTV in Operator mode, when not performing system

administration.

Leaving WebCCTV in Operator mode is a strong protection against improper use of the
machine. Naturally it increases security and helps the system to perform its job, as explained
above. There is no valid reason to leave the machine in Administrator mode.

6.2.3

Windows security updates

To keep your system secure, it is important that you keep it up to date. This will prevent an
attacker from using vulnerabilities that have already been removed by Microsoft.

All installations that do not have Windows XPe Service Pack 3 are

insecure and should be re-installed.

It is the responsibility of the installer to keep WebCCTV up to date with

the latest security patches.

Quadrox is not responsible for keeping the installed WebCCTV’s up to date. This is the
responsibility of the installer. Quadrox is not responsible for problems that originate from not
keeping the machine up to date (patches until the last release applied). If such a problem
occurs (e.g. a virus), Quadrox recommends a full re-installation.

6.2.4

Network security

The network is the main interface of WebCCTV, through which an attack can occur. That’s
why it is important to pay special attention to its security.

In accordance with our general security policy, we will try as much as possible to limit the way
in which the network can be used, while not interfering with WebCCTV functionality. There
are several ways to limit the network:

Physical limitation (dedicated network)

Limiting the number of connections (LAN versus Internet)

Using only one network protocol (TCP/IP)

Allowing only traffic on the necessary network ports (Firewall)

Allowing only known clients

Limiting the functionality of the web server (securing IIS)

Advertising