You can customize the client login environment to suit your network and have greater control over what users can access during login. This chapter contains information about the following: