"Many network administrators new to Linux find it hard to
transition from a point-and-click security configuration interface
to one based on editing complicated and hard-to-locate text files.
Most administrators are well aware of the need to manually put in
roadblocks and obstacles to trip up would-be hackers and ensure
that your company's data stays secure; it's just that in the
unfamiliar Linux world, they're not completely sure of their
bearings or where to start."