The ghost images are one of the most common security elements.
Please refer to the following document that explains how to configure them.
The ghost images are one of the most common security elements.
Please refer to the following document that explains how to configure them.