5
Measures Suitable to the Users' Environment 1: User Management ................................. 108
Measures Suitable to the Users' Environment 2: Host Access Restrictions ....................... 108
Measures Suitable to the Users' Environment 3: Setting to the Digest Authentication....... 108
Measures Suitable to the Users' Environment 4: Changing the Port Number .................... 109
Measures Suitable to the Users' Environment 5: Encrypting Communication.................... 109
Measures Suitable to the Users' Environment 6: Disabling Unused Functions.................. 109