Desired State Configuration

List the capabilities of Desired State Configuration.

Identify the installation requirements.

Explain how this technology can be used to make system management more efficient and more secure.