Configuring security In order to protect your ITNM installation against malicious attacks by intruders you must perform the following tasks.