2.5. Post-installation Procedures


The following steps are the security-related procedures that should be performed immediately after installation of Red Hat Enterprise Linux.
  1. Update your system. enter the following command as root:
    ~]# yum update
    Copy to Clipboard
  2. Even though the firewall service, firewalld, is automatically enabled with the installation of Red Hat Enterprise Linux, there are scenarios where it might be explicitly disabled, for example in the kickstart configuration. In such a case, it is recommended to consider re-enabling the firewall.
    To start firewalld enter the following commands as root:
    ~]# systemctl start firewalld
    ~]# systemctl enable firewalld
    Copy to Clipboard
  3. To enhance security, disable services you do not need. For example, if there are no printers installed on your computer, disable the cups service using the following command:
    ~]# systemctl disable cups
    Copy to Clipboard
    To review active services, enter the following command:
    ~]$ systemctl list-units | grep service
    Copy to Clipboard
Back to top
Red Hat logoGithubredditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust. Explore our recent updates.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

Theme

© 2025 Red Hat