Task | Use |
Configure the Administration ECL and deploy to client workstations. | Prevent unauthorized users from gaining access to data and applications on client workstations, by defining authorized users and authorized actions. |
Set up a security settings policy document. | Use security settings policy documents to:
- Set up and configure one or more administration ECLs
- Specify how and when you want workstation ECLs to be refreshed or replaced.
|
Encourage users to use operating system and screen saver passwords. | Discourage unauthorized workstation access. |
Encourage users to shut off workstations before leaving. | Discourage unauthorized workstation access. |