• Verify and, if required, enable hardware support for encryption.
  • Configure machine to start up whenever power is restored (after an outage etc.).