This chapter describes how to protect computers from security risks using the Device Control feature.

Topics include: