First page Back Continue Last page Summary Graphic
Until your defenses are in place, do not expose this host to the open network. If you are on a closed, controlled network, this is acceptable, however, avoid situations where the machine can be compromised. If it is compromised during the next two steps, it will be difficult to detect. Note that machines have been broken in the first 15 minutes after being put online.
It is impossible to prove that any machine has not been compromised. It can only be proven that the machine has been compromised.