Configuring the Endpoint Policy

The Harmony Endpoint security policyClosed Collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection. contains these components:

When you plan the security policy, think about the security of your network and convenience for your users. A policy should permit users to work as freely as possible, but also reduce the threat of attack from malicious third parties.

You can add more rules to each RuleClosed Set of traffic parameters and other conditions in a Rule Base (Security Policy) that cause specified actions to be taken for a communication session. Base and edit rules as necessary. Changes are enforced after the policy is installed.