Common Rule Components and Actions

Each type of rule has a specific set of required and optional fields that you can customize to meet the needs of your organization’s security policy.
The following table describes the common steps for creating an endpoint security policy rule.
Manage Rules
Define the settings and actions that are specific to the rule type.
For more details on the specific settings required for each rule type, see:
Add activation conditions to the rule—conditions that the endpoint must fulfill for a rule to be applied.
Define the target objects (users, computers, organizational units, groups, and endpoints).
Provide a descriptive name for the rule.
Save and optionally activate the rule.
Back up or restore rules.
Filter the rules shown on the page.
View the default policy rules.
Disable or enable all protection rules.

Related Documentation