Restricting Available Features
Creating the User Account
Enabling Access Control
Restricting USB Connections and Use of External Memory
Using the Audit Log Feature
Making Settings for Password Encryption
Encrypting the Password
Restoring the Password Encryption Key
Restricting File Operations from PDL
Changing the Administrator Password Using Web Config
Setting Up Sub-Administrator Accounts
Creating Sub-Administrators
Deleting Sub-Administrator Accounts
Changing the Sub-Administrator Password
Enabling Program Verification on Start Up
Configuring Domain Restrictions