This chapter describes how to set up a Trusted Extensions system for remote administration, and how to log in and administer it.
Methods for Administering Remote Systems in Trusted Extensions
Configuring and Administering Remote Systems in Trusted Extensions