ZENworks Endpoint Security Policies Reference
- ZENworks Endpoint Security Policies Reference
- Concepts
- About Security and Configuration Policies
- Types of Security Policies
- How Network Locations Operate
- How User, Device, and Zone Policy Assignments Operate
- How the Effective Policy is Determined
- How Policy Precedence is Ordered
- Policy Merging Explained
- Policy Versioning
- Session Support
- Security Policy Summary
- Policy Deployment
- Deployment Best Practices
- Creating Security Policies
- Testing Security Policies
- Designate Test Devices
- Assign Policies to Test Devices
- Assigning Security Policies
- Assign Policies to Users
- Assign Policies to Devices
- Assign Policies to the Management Zone
- Viewing Effective Policies
- Policy Management
- Editing a Policy’s Details
- Defining a Policy’s System Requirements
- Configure Filter Conditions
- Define Filter Logic
- Publishing Policies
- Republish an Old Version
- Publish a Sandbox Version
- Renaming, Copying, and Moving Policies
- Rename a Policy
- Copy a Policy
- Move a Policy
- Enabling and Disabling Policies
- Disable a Policy
- Enable a Policy
- Replicating Policies to Content Servers
- Importing and Exporting Policies
- Export a Policy
- Import a Policy
- Managing Policy Groups
- Create Policy Groups
- Add Policies to Existing Groups
- Rename Policy Groups
- Move Policy Groups
- Delete Policy Groups
- Policy Removal
- Removal Best Practices
- Removing Policy Assignments From Users and Devices
- Remove Multiple Policy Assignments From the Same Object
- Remove a Single Policy Assignment From Multiple Objects
- Removing Policy Assignments From the Management Zone
- Deleting Policies
- Deleting Versions of a Policy
- Policy Settings
- Application Control Policy
- Configure Application Control Settings
- Communication Hardware Policy
- Configure Communication Hardware Settings
- Disable Adapter Bridging Control Settings
- Data Encryption Policy
- General Information
- Enable Encryption for Removable Storage Devices
- Firewall Policy
- Configure the Default Behavior
- Disable Windows Firewall and Register Endpoint Security Management Firewall in Windows Security Center
- Configure Port/Protocol Rules
- Configure Standard Access Control Lists
- Create Custom Access Control Lists
- Location Assignment Policy
- Inherit from Policy Hierarchy
- Manage Allowed Locations
- Microsoft Data Encryption Policy
- General Information
- Removable Data Drives - BitLocker Encryption
- Scripting Policy
- Define Script Settings
- Define Trigger Settings
- Security Settings Policy
- Enable Client Self Defense for Endpoint Security Agent
- Enable Uninstall Password for Endpoint Security Agent
- Enable Password Override for Endpoint Security Agent
- Storage Device Control Policy
- Configure AutoPlay/AutoRun
- Configure Removable Storage Device Access
- USB Connectivity Policy
- Configure USB Devices
- Choose the Default Device Access
- Configure Device Group Access Settings
- Configure USB Device Access Settings
- VPN Enforcement Policy
- Understanding the VPN Enforcement Policy
- Configure Trigger Locations
- Configure VPN Traffic
- Configure Pre-VPN Location
- Configure VPN Location
- Wi-Fi Policy
- Configure General Settings
- Define Access Points
- Configure Minimum Security
- Define the Minimum Security Message
- Data Encryption Key Management
- About Data Encryption Keys
- Active Key
- Multiple Zones
- Key Security
- Generating a New Encryption Key
- Exporting Encryption Keys
- Importing Encryption Keys
- Appendixes
- Naming Conventions in ZENworks Control Center
- Documentation Updates
- Legal Notice