ANALYZING A COMPUTER IN THIS PROCEDURE, YOU USE THE SECURITY CONFIGURA...

15. Click OK to accept the default log file path. An Analyzing System Security message

box appears to show a progress indicator as the snap-in performs the analysis.