Configuring and Managing Protection Objects

This chapter describes how to configure and manage protection objects and enable data protection for them.