Looking for some clairification on putting Endpoint Security & Control into a Ghost image.
There is this article:
http://www.sophos.com/support/knowledgebase/article/28591.html
But is the procedure still needed or can I forget about this now?
http://www.sophos.com/support/knowledgebase/article/12561.html
thanks
This thread was automatically locked due to age.