This section provides information on how to securely maintain your Sentinel server.
Section 3.1, Basic Security Considerations
Section 3.2, Securing Sentinel Data
Section 3.3, Best Practices
Section 3.4, Network Communication Options
Section 3.5, Sensitive Data Locations
Section 3.6, Implementing Intruder Detection and Lockout Mechanisms
Section 3.7, Applying Updates for Security Vulnerabilities in Embedded Third-Party Products