Basic Authentication.........................................................................................................................................44
Windows Authentication.................................................................................................................................53
LDAP Authentication.........................................................................................................................................61
Auto Logout..................................................................................................................................................77
Unlocking Files.............................................................................................................................................95
Restrictions on Destinations.........................................................................................................................98
E-mail Encryption.......................................................................................................................................101
Protecting the Address Book.........................................................................................................................109
4