
ADOBE CONNECT ENTERPRISE SERVER 6
Installation and Configuration Guide
55
The following are important suggestions for securing clusters.
Private networks The simplest solution for clusters in a single location is to create an extra subnet for the Connect
Enterprise system. This approach offers a high level of security.
Local software firewalls FortheConnectEnterpriseServersthatarelocatedinaclusterbutshareapublicnetwork
with other servers, a software firewall may be appropriate on each individual server.
VPN systems In multiserver installations where there are multiple computers hosting Connect Enterprise Server in
different physical locations, you may want to consider using an encrypted channel to communicate with the remote
servers. Many software and hardware vendors offer VPN technology to secure the communications to remote
servers. Connect Enterprise relies on this external security if data traffic must be encrypted.
Security tips and resources
Security best practices
The following checklist describes best practices that will help you secure your Connect Enterprise Server system.
Use SSL to protect network traffic For more information, see www.adobe.com/go/connect_ssl_en.
Run only the services you need Youshouldnotrunapplicationssuchasadomaincontroller,awebserver,oranFTP
server on the same computer as Connect Enterprise Server. By reducing the number of applications and services
running on the computer that hosts Connect Enterprise Server, you can minimize the chances that another appli-
cation can be used to compromise the server.
Update operating system security Check regularly for critical updates that close security holes and apply the
required patches. Some of these security problems are eliminated by a firewall. In general, you should keep your
servers patched with all current security updates approved by Microsoft and the other relevant platform vendors.
Secure host systems If you store sensitive information on your servers, be aware of the physical security of your
systems. Connect Enterprise Server relies on the safety of the host system against intruders, so servers should be kept
secured when private and confidential data is at risk. Connect Enterprise Server is designed to take advantage of
native environmental features such as file system encryption.
Use strong passwords Connect Enterprise users are protected by passwords. Users, and particularly administrators,
should choose strong passwords to keep their data safe. Connect Enterprise Administrators can set login and
password policies in the Connect Enterprise Manager. Connect Enterprise Server installations often use Microsoft
SQL Server, which also requires strong password protection.
Perform regular security audits Audit your systems periodically to ensure that all security features are still operating
as expected. For example, you can use a port scanner to test a firewall.
Security resources and references
The following resources may help you secure your servers.
Network security The SANS (System Administration, Networking, and Security) Institute is a cooperative research
and education organization comprising system administrators, security professionals, and network administrators.
It provides network security courses, as well as certification in network security.
SQL Server security The Microsoft SQL security resources page on the Microsoft website provides information on
securing SQL Server 2000. This information also applies to the embedded database engine installed with Connect.
Komentarze do niniejszej Instrukcji