Edgar: So the next thing will be Available Features which allows you to select which features are displaying on the mobile device. So if you have like a web server which its only purpose is to serve web content, we might not need to see all the features like Hard Disks, Printers, Services on the web server.
So in that case, it might make sense to actually take out the features that you will not like to see and only leave the ISS module for instance which represents the server; this will ensure ... that you will only see ISS and will help you navigate faster through the list of systems.
Furthermore, there is Devices which allows ... and authorize which mobile devices have access to your computer. This can be set per system which is this view, which allows to set which system has access to these devices and commands. Or you can do it globally across all systems with device Paul ... which allow you to configure on which systems, which devices have access to.
We actually have a three-level access policy which allows you to set the access control like no access, to forbid access and not that being able to see or receive notification for a particular system then there is the read-only access level which allows you to see the system and receive the notification but will reject all commands. This way, you can offer your client a monitoring interface through their systems but will not be able to perform any changes to the system.
There's also the full access which will grant you unrestricted access to your systems.
Paul: So you can completely customize how you want to share the monitoring of your systems not only through user accounts where you can delegate responsibilities and access level but you can also go into the next level where that user account you can also delegate access levels on their mobile devices from read-only to certain systems to full access to all the systems.
Edgar: You can authorize devices and if a device is compromised or stolen, you can revoke access ... through it, you can lock it.
Paul: So in the case of an emergency where a device is stolen and you don't want to have any risk at hand, you just simply remove the device from the device list and that thus the problem is solved.