What can be done to facilitate secure operating system configurations? 

Many network administrators are aware of security problems, but fail to properly configure their networks and systems.  Discuss security usability issues. What can be done to facilitate secure operating system configurations?