Watch this video on YouTube
What should administrators perform to reduce a system's attack surface and remove unnecessary software, services, and insecure configuration settings?