Which two steps should be taken to prevent malicious software from running on Cisco CallManager servers?