SECURITY
You can set up a security settings document to manage and deploy execution control lists (ECLs) and IBM® Lotus® Notes® and Internet password settings and synchronization. As these two areas of security are user-specific and are frequently changed by users, you can use a security policy to enforce settings for these areas across the organization, and control the extent to which users can adjust or change these settings.
Related topics