System information

Figure 2.5. Ready to Start the Installation
7. When the installation has completed, the Enterprise Security Client will prompt the user to
insert a token, and can then be launched for immediate use.
Chapter 2. Installing the Enterprise Security Client
12