• Setting up malware defense mechanisms
  • Configuring acceptable use policies