Configuring a security application includes determining whether user
preferences for the security application are pre-loaded in an information
handling system (IHS) received by a user. If the user preferences have
not been pre-loaded a request to receive the user preferences
corresponding to the user and the security application is sent to a
provider of the security application. The request includes a unique
identifier for accessing the user preferences for the security
application. The user preferences, which have been previously configured
by the user for another IHS, are stored in a predefined format and are
accessible to any requester providing the unique identifier. The provider
provides the user preferences corresponding to the unique identifier.