Configuring Policy Enforcement and Device Settings
2
-
3
Configuring Policy Enforcement Settings
Create policies to assess the status of endpoint:
•
antivirus product installations
•
system folders, vulnerabilities
•
registry keys
•
application protocols
•
instant messaging
•
file transfers
Configure settings to pass, block, or redirect different types of endpoint traffic.
Perform the following steps to create and configure a policy:
Step 1
: Create a New Policy.
Step 2
: Configure Authentication Settings.
Step 3
: Configure the Enforcement Policy.
Step 4
: Configure the Network Virus Policy.
Step 5
: Configure the Network Application Policy.
Step 6
: Configure Policy URL Exceptions.
Note:
Policy Enforcement Considerations
on page 1-34 for important about policy
rules and priorities before you create a policy.
Step 1: Create a New Policy
1.
From the main menu, click
Policy Enforcement
. The drop down menu displays.
2.
Click
Policies
from the drop down menu. The
Policies
screen displays.
3.
Click
Add
from the Policies screen. The
Add Policy
screen displays.
4.
Type a policy name in the
Policy name
text box.
5.
Type a comment to describe this policy in the Comment text box. (This is
optional.)