Hardening the operating environment: Summary

When hardening an Enterprise Server installation, review the following steps. Consult the topics in this document and related ones in your product Help for more information.

Run processes under user accounts created for that purpose
Create user accounts specifically for use by Enterprise Server processes, and run processes using those accounts.
Run processes with appropriate privileges
Configure the accounts used to run Enterprise Server processes with only the privileges required for Enterprise Server itself and the applications running under it.
Set filesystem permissions
Restrict file access for Enterprise Server and application processes to only the necessary programs and data files.

Restrict access to files used by Enterprise Server and applications so unauthorized users cannot read or modify them directly.