The following covers workflows for working with specific enrollment protocols, and general configuration operations.
Protocols
Modular Protocol Configuration
For added security, individual protocols can be turned off on an individual level in order to not be accessible even if they lack aliases. To find out more, see Modular Protocol Configuration.