. "If you have a sensitive network where security is a high priority you may want to use a less blanket method." . . .