When we procure a system or software, we often leave the default settings as setup by the vendor. That might not always be good for security. One of the most important components of any systems security work is the development of a consistent security configuration with a sensibile baseline security. Once this is achieved, it