• Enabling Firewall
  • Restricting Root Access
  • Enabling Ransomware Protection