Restricting Available Features
Creating the User Account
Enabling Access Control
Restricting USB Connections and Use of External Memory
Encrypting the Password
Using the Audit Log Feature
Restricting File Operations from PDL
Changing the Administrator Password Using Web Config
Enabling Program Verification on Start Up
Configuring Domain Restrictions