This page is to be read by installation technicians while performing security installations and configurations. Note that before performing an installation, the Security Considerations should have already been made.