beautypg.com
See Also ..................................................................................................................................... 66
Configuring Antivirus Software ...................................................................................................... 66
Configuring Real-Time Monitoring for Viruses ........................................................................... 66
Setting Options for Infected Files ............................................................................................... 67
See Also ..................................................................................................................................... 67
Configuring Firewalls ..................................................................................................................... 67
Protocols and Ports .................................................................................................................... 67
Windows Firewall ....................................................................................................................... 68
See Also ..................................................................................................................................... 69
Security Considerations for End-User Recovery ........................................................................... 69
Granting Appropriate User Privileges ............................................................................................ 69
See Also ..................................................................................................................................... 70
Deployment Plan Checklist and Roadmap .................................................................................... 70
See Also ..................................................................................................................................... 72