Profile Security Configuration and Deployment Considerations

Before defining a profile's security configuration, refer to the following deployment guidelines to ensure the profile configuration is optimally effective: