This section lists the default locations where you will find the installed executables, configuration files, key files, the license file, and the user-specific configuration files after the installation phase.
The required file permissions (read and write rights) are also listed and marked:
MUST if security would be compromised if these permissions are incorrect.
SHOULD if security would not be compromised, but incorrect permissions would give away information.