When hardening an
Enterprise Server installation, review the following steps. Consult the topics in this document and related ones in your product Help for more
information.
- Run processes under user accounts created for that purpose
- Create user accounts specifically for use by
Enterprise Server processes, and run processes using those accounts.
- Run processes with appropriate privileges
- Configure the accounts used to run
Enterprise Server processes with only the privileges required for
Enterprise Server itself and the applications running under it.
- Set filesystem permissions
- Restrict file access for
Enterprise Server and application processes to only the necessary programs and data files.
Restrict access to files used by
Enterprise Server and applications so unauthorized users cannot read or modify them directly.