Error rendering macro 'rw-search'

null

Downloads

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Once the virtual appliance is deployed in the customer environment, the customer's own network and security teams take control and responsibility over securing and maintaining the operating system. This allows you as the customer to apply your own security policies according to your internal guidelines. It also means you control how and when which updates are applied to packages installed directly on the operating system.

panagenda recommends 


Infonote

panagenda strongly recommends that all default passwords (e.g. Linux "root" user, Web-UI "config" user) are changed after setup and periodic operating system security updates are enabled!

...