ANALYZING A COMPUTER IN THIS PROCEDURE, YOU USE THE SECURITY CONFIGURA...

13. Click OK to accept the default log file path. A Configuring Computer Security mes­

sage box displays to show a progress indicator as the snap-in configures the com­

puter using the settings in the database.