Show Table of Contents
2.5. Post-installation Procedures
The following steps are the security-related procedures that should be performed immediately after installation of Red Hat Enterprise Linux.
- Update your system. enter the following command as root:
~]#
yum update - Even though the firewall service,
firewalld, is automatically enabled with the installation of Red Hat Enterprise Linux, there are scenarios where it might be explicitly disabled, for example in the kickstart configuration. In such a case, it is recommended to consider re-enabling the firewall.To startfirewalldenter the following commands as root:~]#
systemctl start firewalld~]#systemctl enable firewalld - To enhance security, disable services you do not need. For example, if there are no printers installed on your computer, disable the
cupsservice using the following command:~]#
systemctl disable cupsTo review active services, enter the following command:~]$
systemctl list-units | grep service

Where did the comment section go?
Red Hat's documentation publication system recently went through an upgrade to enable speedier, more mobile-friendly content. We decided to re-evaluate our commenting platform to ensure that it meets your expectations and serves as an optimal feedback mechanism. During this redesign, we invite your input on providing feedback on Red Hat documentation via the discussion platform.