The Basics of Policy Operation

With the background provided so far, we can now discuss more details about the flow of control for accessing files when FESF is installed.