2.3 Post-Installation Tasks

For information about the way that you can configure the security of an Oracle Linux system, see Chapter 3, Implementing Oracle Linux Security.

For guidelines about hardening an Oracle Linux system, see Chapter 5, Secure Deployment Checklist.