1. Identify - identify the files that users are installed or executing on the computers. Review the Deployment Options for more information.
2. Determine - determine the files that are authorized to run through the Anti-Executable Dashboard.
3.