5
Overview
Overview | You should deploy the | ||
| security policy and the necessary digital certificates. Custom | ||
| installations are designed to make it easy to manage corporate | ||
| security policies for tens, hundreds, or thousands of end users. | ||
| Along with the necessary software and files, you should provide | ||
| specific | ||
| This facilitates management of corporate security policies for your end | ||
| users and simplifies what the end user must do. | ||
| The | ||
| file (userworksheet.doc) in MS Word format that you can customize | ||
| and send to users. | ||
Figure |
|
|
|
|
|
| |
userworksheet.doc file |
|
|
|
contained on |
|
|
|
product CD |
|
|
|
|
|
| Word |
|
|
| format |
|
|
|
|
This worksheet contains five main sections that you should edit and save before distributing to end users. These sections are based on the information presented in earlier chapters in this manual.
Certificate instructions
Security policy instructions
Basic connection instructions
Deploying