Which step can be excluded from the install and configuration process for a valid Mobile Device Management solution that is used for Symantec Data Loss Prevention for Tablets?
Which command line utility generates custom authentication keys to improve the security of the data that is transmitted between the Enforce server and detection servers?