Important post-install configuration

Overview

The following are not part of the base install, but either can be essential to system function (like adding boot entropy for some headless systems like the Raspberry Pi) or are widely accepted best practices (like creating a non-root admin user and limiting time spent as root).

Configuration

  1. For headless systems, add entropy
  2. Create a non-root admin user
  3. Configure SSH for non-root public key access only
  4. Add packages for pre-mount filesystem checks
  5. Use encrypted LBU (not applicable to ‘sys’ installs)