Table of Contents

  1. Data Encryption
    1. Data Recovery Agents (DRAs)
    2. Creating a DRA
    3. Using the Cipher Utility
    4. Moving, Copying and Sharing Encrypted Files
  2. Security Configuration and Local Security Policy
    1. Local Security Settings
  3. Local User and Group Accounts
    1. Built-In Local Groups
    2. Built-In System Groups
    3. Creating Local User and Group Accounts
    4. Managing Local Group Membership
    5. User Accounts Tool
  4. Web Browser Security Settings