REX610
Cyber Security Deployment Guideline
Table of contents
This manual........................................................................................ 3
Intended audience.............................................................................. 3
Symbols.........................................................................................4
Password policies.............................................................................17
Audit trail...........................................................................................19
Logging in......................................................................................... 21
Logging out.......................................................................................23
Backup files...................................................................................... 25
Table of contents
1