Common Rule Components and Actions

Each type of rule has a specific set of required and optional fields that you can customize to meet the needs of your organization’s security policy.
The following table describes the common steps for creating an endpoint security policy rule.
Manage Rules
Define the settings and actions that are specific to the rule type.
Add activation conditions to the rule—conditions that the endpoint must fulfill for a rule to be applied.
Define the target objects to which the rule applies. You can apply rules directly to object types. You can also create virtual groups based on endpoint characteristics or Active Directory group membership for reuse across rules.
Provide a descriptive name for the rule.
Save and optionally activate the rule.
Back up or restore rules.
Filter the rules shown on the page.
View the default policy rules.
Disable or enable all protection rules.

Recommended For You