Allow you to. Require authentication for user connecting to the computer. Control access to resources. Monitor access to resources by auditing user actions.
Allow you to.Require authentication for user connecting to the computer.Control access to resources.Monitor access to resources by auditing user actions.