9.7 Security Considerations

During the installation process, the install program writes log files to the installation directory. These files contain information about your configuration. Once your environment is configured, you should consider deleting these log files or storing them in a secure location.

During the installation process, you may choose to write the database schema to a file. Since this file contains descriptive information about your database, you should move to a secure location after the installation process is complete.