The user is a member of one or more security profiles.
Action:
The user creates the new computer object using the DSM Explorer or the DSM command line utility.
Post-Conditions:
The new computer object is created.
The area_ace is derived from the security profile and is assigned to the computer object. If the user is a member of more than one security profile, the area_ace of all relevant security profiles are OR'ed and assigned to the secured object.