Security Guide Secure installation and configuration 2 Secure installation and configuration In this chapter: Installation overview Post-installation configuration