A | 27 | |
A.1 | Choosing security levels | 27 |
A.2 | Choosing security dependencies | 30 |
A.3 Selecting security levels during installation | 30 | |
B Configuring | 31 | |
B.1 Configuring Sec20MngDMZ or Sec30DMZ security levels | 31 | |
B.2 Configuring Sec10Host level | 31 | |
C Question modules | 33 | |
D Sample weight files | 63 | |
D.1 | all.weight | 63 |
D.2 | CIS.weight | 64 |
E CIS mapping to | 67 | |
Index | ................................................................................................................................. | 71 |
4Table of Contents