![]() The Information Security Office has distilled the CIS lists down to the most critical steps for your systems, with a particular focus on configuration issues that are unique to the computing environment at The University of Texas at Austin. ![]() ![]() The hardening checklists are based on the comprehensive checklists produced by CIS.
0 Comments
Leave a Reply. |