This section provides information on the following
Section 8.1, Overview
Section 8.2, Setting Up Secure Workstation
Section 8.3, Understanding Secure Workstation Policies
Section 8.4, Local Policy Editor
Section 8.5, Configuring Secure Workstation Events
Section 8.6, The Secure Workstation Post-Login Method for NMAS
Section 8.7, Quick Login/Logout