Security best practices

When a self-hosted SeekTable is used only for the company's internal purposes (and you can control the access with VPN) in most cases it is ok to use a default app configuration. However, if on-premise SeekTable is accessible from internet and/or used to access reports that contain sensitive data you may follow best practices to avoid many security vulnerabilities:

In case of really strong security requirements you can:

Some technical details that may be important if you need to pass a security audit: