ANALYZING A COMPUTER IN THIS PROCEDURE, YOU USE THE SECURITY CONFIGURA...

16. When the analysis is complete, expand the Security Configuration And Analysis

heading and the Account Policies heading in the console’s scope pane.