This section provides additional information on how to securely install, configure, and maintain Novell Sentinel Log Manager.
Section 2.1, Hardening
Section 2.2, Best Practices
Section 2.3, Network Communication Options
Section 2.4, Sensitive Data Locations
Section 2.5, Overriding the IP Address in the Web Server
Section 2.6, Applying Updates for Security Vulnerabilities in Embedded Third-Party Products