After the initial setup, perform the following additional configurations that may be required for your environment. Enable Firewall Enabling Secure SSH Connectivity Enable Ransomware Protection Configure Internal NTP Servers Configure Software Encryption Monitor the Hardware Install Software Updates