2 Secure installation and configuration In this chapter Installation overview Post-installation configuration