How is PIM usually run?
A.
Via settings in IE or Firefox browsers
B.
Via a network proxy such as Connector
C.
Via a service that runs transparently on the user’s machine and cannot be stopped
D.
Via a login script or GPO at the time that the user logs on