Questo contenuto non è disponibile nella lingua selezionata.
2.5. Post-installation Procedures
The following steps are the security-related procedures that should be performed immediately after installation of Red Hat Enterprise Linux.
- Update your system. enter the following command as root:
yum update
~]# yum update
Copy to Clipboard Copied! - Even though the firewall service,
firewalld
, is automatically enabled with the installation of Red Hat Enterprise Linux, there are scenarios where it might be explicitly disabled, for example in the kickstart configuration. In such a case, it is recommended to consider re-enabling the firewall.To startfirewalld
enter the following commands as root:systemctl start firewalld systemctl enable firewalld
~]# systemctl start firewalld ~]# systemctl enable firewalld
Copy to Clipboard Copied! - To enhance security, disable services you do not need. For example, if there are no printers installed on your computer, disable the
cups
service using the following command:systemctl disable cups
~]# systemctl disable cups
Copy to Clipboard Copied! To review active services, enter the following command:systemctl list-units | grep service
~]$ systemctl list-units | grep service
Copy to Clipboard Copied!