After the initial setup, perform the following additional configurations that may be required for your environment. Configure the Email Server Enable Ransomware Protection Monitor the Hardware Configure Internal NTP Servers Configure Software Encryption Install Software Updates