Securing should include configuration of basic security settings and policies for end devices.