Basic Authentication.........................................................................................................................................43
Windows Authentication.................................................................................................................................49
LDAP Authentication.........................................................................................................................................56
Auto Logout..................................................................................................................................................72
Protecting the Address Book...........................................................................................................................77
Deleting Data on the Hard Disk......................................................................................................................84
Auto Erase Memory.....................................................................................................................................84
Erase All Memory........................................................................................................................................88
Limiting Available Functions............................................................................................................................92
Access Control.............................................................................................................................................97
Enabling/Disabling Protocols.....................................................................................................................98
Protection Using Encryption..........................................................................................................................108
4