Workstation data security
To prevent unauthorized access to user workstation information and applications, secure Notes® user computers.
Task |
Use |
---|---|
Configure the Administration ECL and deploy to client workstations. |
Prevent unauthorized users from gaining access to data and applications on client workstations, by defining authorized users and authorized actions. |
Set up a security settings policy document. |
Use security settings policy documents to:
|
Encourage users to use operating system and screen saver passwords. |
Discourage unauthorized workstation access. |
Encourage users to shut off workstations before leaving. |
Discourage unauthorized workstation access. |