After initial installation and configuration, you can maintain and monitor the security posture of your system by following the procedures for:
Regularly reviewing audit records
Running package and file integrity checks
Monitoring network activity
Running compliance checks