This section lists the default locations where you will find the installed executables, configuration files, key files, the license file, and the user-specific configuration files after the installation phase.
The required file permissions (read and write rights) are also listed and marked:
MUST if security is compromised if these permissions are incorrect.
SHOULD if security is not be compromised, but incorrect permissions would give away information.