Task | Use |
Configure the Administration ECL and deploy to client workstations. | Prevent unauthorized users from gaining access to data and applications on client workstations, by defining authorized users and authorized actions |
Set up a security settings policy document | Use security settings policy documents to:
- Set up and configure one or more administration ECLs
- Specify how and when you want workstation ECLs to be refreshed or replaced
|
Encourage users to use operating system and screen saver passwords | Discourage unauthorized workstation access |
Encourage users to shut off workstations before leaving | Discourage unauthorized workstation access |