Guidelines for Configuring Authorization Policies and Profiles.Machine Access Restriction for Active Directory User Authorization.Configure Permissions for Downloadable ACLs.Authentication Reports and Troubleshooting Tools.Authentication Methods and Authorization Privileges.Secure Authentication Using Encrypted Passwords and Cryptographic Techniques.