When hardening an 
               		Enterprise Server installation, review the following steps. Consult the topics in this document and related ones in your product Help for more
               information. 
               	 
            
 
            	 
             
               		 
               		  
               - Run processes under user accounts created for that purpose 
                  		  
               
- Create user accounts specifically for use by 
                  			 Enterprise Server processes, and run processes using those accounts. 
                  		  
               
- Run processes with appropriate privileges 
                  		  
               
- Configure the accounts used to run 
                  			 Enterprise Server processes with only the privileges required for 
                  			 Enterprise Server itself and the applications running under it. 
                  		  
               
- Set filesystem permissions 
                  		  
               
- Restrict file access for 
                  			 Enterprise Server and application processes to only the necessary programs and data files. 
                  			 
                  Restrict access to files used by 
                     				Enterprise Server and applications so unauthorized users cannot read or modify them directly.