After Meridian is properly installed and configured in a network, administration tasks revolve primarily around the aspects of security and maintaining a high performance infrastructure upon which Meridian can run productively.
This section describes the following topics:
- 
                                                    Summaries of the security privileges required on each computer used by Meridian 
- 
                                                    Guidelines for using Meridian with popular Microsoft network models 
- 
                                                    Considerations for configuring Meridian in a mixed vendor network 
- 
                                                    How to configure and apply Meridian security roles within vaults 
- 
                                                    Instructions for configuring remote access to Meridian 
- 
                                                    Explanations of the effects of network performance on Meridian 
