Security and Compliance Considerations - Step 5 of Desktop Deployment