The Security Configuration Guide describes the secure deployment and usage settings, secure maintenance, and physical security controls.
Click the attachment below to view or download the Security Configuration Guide.