38 ZENworks Endpoint Security Management Administration Guidenovdocx (en) 17 September 20094.1.2 Server MaintenanceIt is recommended that regular disk cleanup tasks be configured to run on this server to removetemporary files out of the Windows\temp folder. Under extreme load conditions, Windows cangenerate an inordinate amount of temporary files that needlessly consume disk space.4.1.3 Upgrading the SoftwareTo upgrade your software from one release to another, you must uninstall the old release and installthe new release. Complete instructions are provided in “Upgrading” in the ZENworks EndpointSecurity Management Installation Guide.4.1.4 UninstallTo uninstall the Management Service, use the Add/Remove Programs function in the WindowsControl Panel.To uninstall the Management Console (when run on a separate computer), use the Add/RemovePrograms function in the Windows Control Panel.4.2 Securing Server AccessThe following sections contain information to help you secure access to your ZENworks EndpointSecurity Management server: Section 4.2.1, “Physical Access Control,” on page 38 Section 4.2.2, “Network Access Control,” on page 39 Section 4.2.3, “High Availability,” on page 39 Section 4.2.4, “Running the Service,” on page 394.2.1 Physical Access ControlPhysical access to the Management Server should be controlled to prevent access by unauthorizedparties. Measures taken should be appropriate to the risks involved. There are multiple availablestandards and guidelines available, including NIST recommendations, HIPAA requirements, ISO/IEC 17799, and less formal collections of recommendations such as CISSP or SANS guidelines.Even when a given regulatory frameworks is not applicable, it may still act as a valuable resourceand planning guide.Disaster Recovery and Business Continuity mechanisms to protect the Management Server shouldbe put in place to protect the server if an organizational risk assessment identifies a need for suchsteps. The mechanisms best used will depend on the specifics of the organization and its desired riskprofile, and cannot be described in advance. There are multiple available standards and guidelinesavailable, including NIST recommendations, HIPAA requirements, ISO/IEC 17799, and less formalcollections of recommendations such as CISSP or SANS guidelines.