This section explains how Security Administrators can manage and track protected files and user activities. It covers the following topics:
Click on a particular section to find out more.