Mechanisms exist to obtain, protect and distribute administrator documentation for systems that describe: ? Secure configuration, installation and operation of the system; ? Effective use and maintenance of security features/functions; and ? Known vulnerabilities regarding configuration and use of administrative (e.g., privileged) functions.