• Creating a Storage Pool
  • Enabling Firewall
  • Restricting Root Access
  • Enabling Ransomware Protection