Managing Data Security

This chapter describes how to initialize the WORM clock and configure the audit log and antivirus service.