The ghost images are one of the most common security elements.

Please refer to the following document that explains how to configure them.

DOWNLOAD

If you need any additional support, please reach out.