A SERVICE OF

logo

Identity Control
If you want to use Identity Control, follow these steps:
1. Select the Enable Identity Control check box.
2. Create rules to protect your sensitive data. For more information, please refer to
Creating Identity Rules” (p. 140).
3. If needed, define specific exclusions from the rules you have created. For more
information, please refer to Defining Exclusions (p. 143).
4. If you are an administrator on the computer, you can exclude yourself from
identity rules created by other administrators.
For more information, please refer to Rules Defined by Other Administrators
(p. 145).
18.2.1. Creating Identity Rules
To create an identity protection rule, click the Add button and follow the
configuration wizard.
Privacy Control
140