Servers should be kept in a physically secure location with access by authorized personnel only.
The corporate network should be physically secured against eves-dropping or packet sniffing. Any packets associated with the administration of QuickFinder should be the most secured.
Access to QuickFinder indexes, configuration settings, and logs should be restricted. This includes file system access rights, FTP access, access via Web utilities including QuickFinder Manager, and any other type of access to these files.
Configuration settings that serve to send QuickFinder data to other servers or e-mail accounts or that protect QuickFinder data should be examined periodically to ensure that they have not been tampered with.
When synchronizing QuickFinder indexes, configuration settings, or templates to servers outside the corporate firewall, both QuickFinder Authentication and the HTTPS protocol should be employed (see Modifying Administrator Authentication Settings). Because this ultimately sends the entire QuickFinder configuration of a server to another server, great security precautions should be taken.
When QuickFinder is administered by users outside of the corporate firewall, both QuickFinder Authentication and the HTTPS protocol should be used. A VPN should also be employed.
If a server is accessible from outside the corporate network, a firewall should be employed to prevent direct access by a would-be intruder.
Audit logs and query reports should be kept and analyzed periodically.