ZENworks Endpoint Security Policies Reference

  ZENworks Endpoint Security Policies Reference
    Concepts
      About Security and Configuration Policies
      Types of Security Policies
      How Network Locations Operate
      How User, Device, and Zone Policy Assignments Operate
      How the Effective Policy is Determined
        How Policy Precedence is Ordered
        Policy Merging Explained
      Policy Versioning
      Session Support
      Security Policy Summary
    Policy Deployment
      Deployment Best Practices
      Creating Security Policies
      Testing Security Policies
        Designate Test Devices
        Assign Policies to Test Devices
      Assigning Security Policies
        Assign Policies to Users
        Assign Policies to Devices
        Assign Policies to the Management Zone
      Viewing Effective Policies
    Policy Management
      Editing a Policy’s Details
      Defining a Policy’s System Requirements
        Configure Filter Conditions
        Define Filter Logic
      Publishing Policies
        Republish an Old Version
        Publish a Sandbox Version
      Renaming, Copying, and Moving Policies
        Rename a Policy
        Copy a Policy
        Move a Policy
      Enabling and Disabling Policies
        Disable a Policy
        Enable a Policy
      Replicating Policies to Content Servers
      Importing and Exporting Policies
        Export a Policy
        Import a Policy
      Managing Policy Groups
        Create Policy Groups
        Add Policies to Existing Groups
        Rename Policy Groups
        Move Policy Groups
        Delete Policy Groups
    Policy Removal
      Removal Best Practices
      Removing Policy Assignments From Users and Devices
        Remove Multiple Policy Assignments From the Same Object
        Remove a Single Policy Assignment From Multiple Objects
      Removing Policy Assignments From the Management Zone
      Deleting Policies
      Deleting Versions of a Policy
    Policy Settings
      Application Control Policy
        Configure Application Control Settings
      Communication Hardware Policy
        Configure Communication Hardware Settings
        Disable Adapter Bridging Control Settings
      Data Encryption Policy
        General Information
        Enable Encryption for Removable Storage Devices
      Firewall Policy
        Configure the Default Behavior
        Disable Windows Firewall and Register Endpoint Security Management Firewall in Windows Security Center
        Configure Port/Protocol Rules
        Configure Standard Access Control Lists
        Create Custom Access Control Lists
      Location Assignment Policy
        Inherit from Policy Hierarchy
        Manage Allowed Locations
      Microsoft Data Encryption Policy
        General Information
        Removable Data Drives - BitLocker Encryption
      Scripting Policy
        Define Script Settings
        Define Trigger Settings
      Security Settings Policy
        Enable Client Self Defense for Endpoint Security Agent
        Enable Uninstall Password for Endpoint Security Agent
        Enable Password Override for Endpoint Security Agent
      Storage Device Control Policy
        Configure AutoPlay/AutoRun
        Configure Removable Storage Device Access
      USB Connectivity Policy
        Configure USB Devices
        Choose the Default Device Access
        Configure Device Group Access Settings
        Configure USB Device Access Settings
      VPN Enforcement Policy
        Understanding the VPN Enforcement Policy
        Configure Trigger Locations
        Configure VPN Traffic
        Configure Pre-VPN Location
        Configure VPN Location
      Wi-Fi Policy
        Configure General Settings
        Define Access Points
        Configure Minimum Security
        Define the Minimum Security Message
    Data Encryption Key Management
      About Data Encryption Keys
        Active Key
        Multiple Zones
        Key Security
      Generating a New Encryption Key
      Exporting Encryption Keys
      Importing Encryption Keys
    Appendixes
      Naming Conventions in ZENworks Control Center
      Documentation Updates
    Legal Notice