Security checkpoints can be configured for the following activities of MRB:
Only a system administrator can access and configure the security checkpoints in the Security Checkpoints window.
When the security checkpoint is active and turned on, the end user will be presented with an extra authentication dialog box at the checkpoint. Successful security checkpoints are logged and can be viewed in the Security Checkpoints Log window.
N/A
N/A