In this chapter, we will cover the following topics: Setting up DPM protection with NTLM authentication Setting up DPM protection with certificate authentication