Description

Capabilities
Login Protection

Delimiting access to resources

Access control to devices

Registration of IS events

Integrity control

Auditing user actions

Mashing the residual information

Convenience of administration

Integration with Centralized Management Tools Secret Net 7

How to Enable a Computer in a Windows Domain