You have complete control over the objects and configurations that will be included in the transfer process. You can deselect logons if you've already set up security on the destination device, for example.