Standard System Configurations:

ForensiX is intended to run as a single user system in a relatively
secure physical environment with trusted but not perfect users.  As a
result, there are some standard configurations that are appropriate for
a ForensiX system that would be considered suitable for forensic
examination. These are generally as follows:

For systems NOT used in sniffing traffic from remote IP networks:

	No external services enabled on IP (only console access)
	IP firewall configured to allow only outbound requests
	Logging of all inbound request attempts
	Only authorized users with user IDs
	Only Linux distribution and ForensiX software on board

For systems used in sniffing traffic from remote IP networks:

	As above but add:
		deception toolkit in one-time password mode
		port 22 (ssh) access enabled only after OTP
			from authenticated IP address for 1 login
