viewing Privacy Manager certificate details 33 viewing trusted contact
details 37
R restrictingaccess to sensitive data 7 device access 53
S |
|
|
|
|
security |
|
|
|
|
key objectives |
| |||
levels |
|
|
| |
logging in |
|
| ||
login methods |
| |||
roles |
|
|
| |
setup wizard |
| |||
security setup password | ||||
shred profile |
|
|
| |
customizing |
| |||
predefined |
| |||
selecting or creating | ||||
simple delete profile |
| |||
customizing |
| |||
smart card |
|
|
| |
initializing |
|
| ||
PIN |
|
|
| |
registering |
| |||
setting up |
|
|
T
targeted theft, protecting against
| |
TPM chip |
|
enabling | |
initializing |
tracking a computer 57
U
unauthorized access, preventing 8
W
Windows Logon password 10
64 Index | ENWW |