Setup security for accessing RMS.
Audit the Users setup in RMS.
Setup Two Factor Authentication in RMS.
Setup the Password Policy for users accessing RMS.
Reset the password for another user in RMS.
Limit the IP Addresses authorised to access RMS.
Setup domain verification in RMS.