that depends primarily on whether the CCM is the Publisher or the Subscriber. I could point you to some services i have disabled in the past on my CCM based on the role they were playing in the cluster, but that won't help much against DOS attacks. for the most part, your best security would be to consider a Firewall that will allow only specific addresses/port numbers through. Cisco does a good job at documented all ports in use on most of their gear, so you won't have a problem finding the ranges of port to open on the FW. other than that, you may follow Microsoft's recommendations on security, but no one guaranties you won't run into some conflicts.
You may be able to secure the CCM application, but securing a Windows 2K box (which is the most important piece) is a whole new game.
SIP traces provide key information in troubleshooting SIP Trunks, SIP
endpoints and other SIP related issues. Even though these traces are in
clear text, these texts can be gibberish unless you understand fully
what they mean. This document attempts to br...
Please find the attached HTML document, download and open it on your PC.
This provides an easy to use form where you simply answer a few
questions and it will render the proper jabber-config.xml file for you
to copy/paste. There is built in logic to verif...
[toc:faq]CUCM Database Replication is an area in which Cisco customers
and partners have asked for more in-depth training in being able to
properly assess a replication problem and potentially resolve an issue
without involving TAC. This document discusse...