- Reinforcing Security
- Changing Security Settings
- Encrypting Communications
- Restricting Communications
- Restricting network or USB connections
- Managing the certificates for this machine
- Monitoring or Restricting User Operations
Enhancing the security by simple operation