This document provides a summary of tips for hardening the default installation of Red Hat Enterprise Linux 5. It recommends securing physical access to servers, minimizing installed software, regularly updating systems, disabling unnecessary services, removing SUID/SGID permissions and X Windows, configuring firewalls and SELinux, and securing SSH access. The full document provides more detailed guidance for implementing these security configurations.