First page Back Continue Last page Summary Graphics

Installation (cont.)

  • Until your defenses are in place, do not expose this host to the open network. If you are on a closed, controlled network, the risk may be is acceptable, however, avoid situations where the machine can be compromised. If it is compromised during the next two steps, it will be difficult to detect. Note that machines have been broken in the first 15 minutes after being put online.
  • Always remember:
  • It is impossible to prove that any machine has not been compromised. It can only be proven that the machine has been compromised.

    Notes: