When you configure a secure Mirage environment, you can change settings and make adjustments in several areas to protect your systems. Ports and Protocols Used by MirageThe Mirage system and clients use default communication ports. Make sure that the correct ports and protocols are selected for the system. Protecting Mirage ResourcesMirage includes several configuration files and similar resources that must be protected. Mirage Log FilesMirage creates log files that record the installation and operation of its components. Mirage AccountsYou set up system and database accounts to administer Mirage components.