Available and Secure Environment Setup Checklist

Ensure you have secured platform and made components highly available. Check activities off as you complete them.

Activity Completed?
Ensure correct roles are part of the security repository (usually an LDAP server).  
Create the security configurations required for administration and device user access.  
Isolate the monitoring and domain logging databases from the cache server.  
Disable all monitoring profiles.  
Stop all Unwired Servers and data services.  
If replication payloads are used, tune replication performance properties.  
If messaging payloads are used, tune messaging performance properties.  
Install Relay Server and configure RSOES to create required farms.  
Test the connection though Relay Server into the corporate LAN.