After the initial setup, perform the following additional configurations that may be required for your environment. Install operating system updates Enable Firewall Restrict Root Access Enable Ransomware Protection