This chapter discusses additional security configurations that you should perform immediately after installing JD Edwards EnterpriseOne, as well as the initial security setup for administration applications, tables, and other EnterpriseOne tools.