When setting up host nodes, after installing the software agent, the next step involves __________ the node to a protection policy.
encrypting
linking
synchronizing
auditing
Submit