Hello All,
not been a WM expert, I would sincerely appreciate someone point me to the document describing WM Enterprise secure installation and hardening guides.
I am extremely interested in information on how to audit and review the installation and configuration of entire WM implementations and its impact on overall corporate infrastracture, both from within internal network and from the outside view.
Sincerely,
Michael Grinberg
mokun at buckeye-express.com dot com