Book Navigation ‹ Scenario 2: Cross-border training up Third step: Clone desktop to all participants ›