Managing Protected Computers