Using Secure Configurations | Standardize Your Security
Linux Academy
MAY 31, 2019
This security control allows the use of best practices during set-up, unifies configurations, and monitors for changes. ” Last, let’s remember to back up our network device configurations and monitor for changes. Don’t stop with the backup, though — we still need to monitor for changes.
Let's personalize your content