General considerations for security
- Last UpdatedJul 19, 2024
- 1 minute read
Before you review the information in this section, it is recommended that you go through the following checklist to ensure you plan to cover the security areas that apply to your ICS and organization.
|
Security Area |
Reference Section |
|---|---|
|
Physical and virtual access to the host |
|
|
Latest Windows patches applied |
|
|
Protecting the host from viruses and malware |
|
|
Access to content on the host |
|
|
Securing your network |
|
|
Configuring services and ports |
|
|
Securing client/server communication |
|
|
User and group management |
|
|
Planning for emergencies |
For a list of security feature help topics refer to the table at the end of this section.