Servers might run okay out of the box, but before you put it in production, there are 10 steps you need to make sure it's configured securely. The details of these steps may vary from distribution to distribution, but conceptually they apply to any flavor of Linux. By checking these steps off on new servers, you can ensure that they have at least basic protection against the most common attacks.
Download this eBook to discover: