How is PIM usually run?
A. Via settings in IE or Firefox browsers
B. Via a network proxy such as Connector
C. Via a service that runs transparently on the user’s machine and cannot be stopped
D. Via a login script or GPO at the time that the user logs on