This chapter describes how to configure and manage protection objects and enable data protection for them.