Configure Securely

Once you know what you have, you need to make sure you have the appropriate settings to secure it. Systems, applications and devices have recommended security settings, known as “configurations” that help ensure conditions are optimized to protect against unauthorized access or activity. You should make sure your devices and applications are set up to be more secure. First, see the inventory list you created to go through each device and application you have to configure it for automatic updates.