Start Level 1 Node: Collaboration Security GuideCollaboration Security GuideEnd Level 1 Node: Collaboration Security Guide
   Start Level 2 Node: Technical System LandscapeTechnical System LandscapeEnd Level 2 Node: Technical System Landscape
   Start Level 2 Node: User Management and AuthenticationUser Management and AuthenticationEnd Level 2 Node: User Management and Authentication
   Start Level 2 Node: PermissionsPermissionsEnd Level 2 Node: Permissions
   Start Level 2 Node: Security Managers for CollaborationSecurity Managers for CollaborationEnd Level 2 Node: Security Managers for Collaboration
   Start Level 2 Node: Data Security in RoomsData Security in RoomsEnd Level 2 Node: Data Security in Rooms
   Start Level 2 Node: Security Considerations for ForumsSecurity Considerations for ForumsEnd Level 2 Node: Security Considerations for Forums
   Start Level 2 Node: Differentiating User Data Display in External PortalsDifferentiating User Data Display in External PortalsEnd Level 2 Node: Differentiating User Data Display in External Portals
      Start Level 3 Node: Activating the Extension for Differentiated Display of User DataActivating the Extension for Differentiated Display of User DataEnd Level 3 Node: Activating the Extension for Differentiated Display of User Data
      Start Level 3 Node: Configuring the Default Display of User DataConfiguring the Default Display of User DataEnd Level 3 Node: Configuring the Default Display of User Data
      Start Level 3 Node: Configuring the Minimal Display of User DataConfiguring the Minimal Display of User DataEnd Level 3 Node: Configuring the Minimal Display of User Data
      Start Level 3 Node: Configuring the Restricted Display of User DataConfiguring the Restricted Display of User DataEnd Level 3 Node: Configuring the Restricted Display of User Data
   Start Level 2 Node: Restriction of Mail PermissionsRestriction of Mail PermissionsEnd Level 2 Node: Restriction of Mail Permissions
      Start Level 3 Node: Assigning Restricted Mail Permissions to UsersAssigning Restricted Mail Permissions to UsersEnd Level 3 Node: Assigning Restricted Mail Permissions to Users
      Start Level 3 Node: Restricting the Number of Mail RecipientsRestricting the Number of Mail RecipientsEnd Level 3 Node: Restricting the Number of Mail Recipients
   Start Level 2 Node: Communication Channel SecurityCommunication Channel SecurityEnd Level 2 Node: Communication Channel Security
   Start Level 2 Node: Data Storage SecurityData Storage SecurityEnd Level 2 Node: Data Storage Security
   Start Level 2 Node: Active CodeActive CodeEnd Level 2 Node: Active Code
   Start Level 2 Node: Trace and Log FilesTrace and Log FilesEnd Level 2 Node: Trace and Log Files