Restricting Available Features
Creating the User Account
Enabling Access Control
Restricting USB Connections and Use of External Memory
Making Settings for Password Encryption
Encrypting the Password
Restoring the Password Encryption Key
Using the Audit Log Feature
Setting a Password Policy
Restricting Access from Applications
Restricting File Operations from PDL
Changing the Administrator Password Using Web Config
Program Verification on Start Up
Configuring Domain Restrictions