This section provides additional information on how to securely install, configure, and maintain Sentinel.
Section 4.1, Securing Sentinel Data
Section 4.2, Basic Security Considerations
Section 4.3, Best Practices
Section 4.4, Network Communication Options
Section 4.5, Sensitive Data Locations
Section 4.6, Applying Updates for Security Vulnerabilities in Embedded Third-Party Products