Pre-installation General Considerations

Before product installation, it is important that each of the following items are considered:

  • Networking: Virtual and physical interfaces, bridged and routed

  • User roles: Operator and administrator and others, view or modify or delete

  • Password rules: length and character requirements, other characteristics

  • Cryptographic algorithms: allowed or mandated, usage guidelines

  • Patch or update process security: limitations, roles allowed to execute procedures

This is not an exhaustive list. The more things that can be planned ahead of time, the better.