MID Server configuration Administrators must configure a MID Server to ensure that it has access to sufficient system resources, probes the proper data sources, and communicates with the instance as expected. You must complete all the steps in MID Server Installation before attempting any of the configuration steps explained here. Restart a MID Server after any configuration change for the changes to take effect. Note: Using special characters in an XML configuration file requires you to encode them. Important: All new MID Servers must be validated before use. This ensures that the MID Server is trusted to access credentials used by the instance for automations. For instructions, see Validate the MID Server. MID Server Records that cannot be altered These records cannot be modified or deleted. Table Record Public Page [sys_public] InstanceInfo Scripted Web Service [sys_web_service] InstanceInfo GetMIDInfo MIDAssignedPackages MIDFieldForFileProvider MIDFileSyncSnapshot MIDServerCheck MIDServerFileProvider The MID Server dashboardThe MID Server dashboard is a central place for MID Server users to monitor ongoing operations. The dashboard consists of reports and gauges that display information from the MID Server Status table. MID Server selectionYou can configure applications to select MID Servers in a variety of ways. MID Server properties and parametersYou can control several aspects of MID Servers by using properties and parameters.MID Server pauseThe MID server can be put into a Paused state to temporarily prevent it from polling the ECC Queue for work or sending Discovery results back to the instance.MID Server domain separationMID Servers can be configured in separate domains.Privileged commands for the MID ServerThe ServiceNow platform provides default privileged commands for the MID Server to use and the ability to add additional commands to the system.MID Server security and encryptionSeveral options are available for you to enhance security on MID Servers, including credential and encryption security, the authorization of SOAP requests, and the establishment of secure socket layer (SSL) connections.