Using Secure Configurations | Standardize Your Security
Linux Academy
MAY 31, 2019
We use templates for network devices, workstations, laptops, and servers so that all of our devices match our security templates. Network Device Configurations. For network devices, we should consider using RADIUS/TACACS+ for authentication purposes, not a shared user account. How do we do this kind of monitoring?
Let's personalize your content