Use Cases The following use cases are presented in this section: • Controlling Email Attachments • Controlling Risky Applications