Configuring Endpoint Policy

The security policyClosed Collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection. in the Endpoint Web Management Console contains these components:

In addition, the Endpoint policy contains the Global Policy Settings (see Configuring Global Policy Settings) and the Deployment Policy (see Deploying Endpoint Clients).

You can add more rules to each RuleClosed Set of traffic parameters and other conditions in a Rule Base (Security Policy) that cause specified actions to be taken for a communication session. Base and edit rules as necessary. Changes are enforced after the policy is installed.

When you plan the security policy, think about the security of your network and convenience for your users. A policy should permit users to work as freely as possible, but also reduce the threat of attack from malicious third parties.

The security policy has these on-screen options:

  • User-Based Policy - Policy is arranged by blades, each blade has its own set of rules (same as the SmartEndpoint view)

  • Computer-Based Policy - Policy is arranged by the protected scope. Each rule contains the protected scope and the blades which are activated for that protected scope.

To switch between the views, go to Endpoint Settings > Policy Operation Mode.