To define a smaller subset of target objects, select the
and then enter one or more
in the Include or Exclude areas.
The Endpoint Security Manager queries Active Directory to verify
the users, computers, groups, or organizational units. The ESM Console
also offers autocompletion as you type for existing endpoints and
existing virtual groups.
Review the rule name and description. The ESM Console automatically
generates the rule name and description based on the rule details
but permits you to change these fields, if needed.
To override the autogenerated name, select the
Activate automatic description
and then enter a rule name and description of your choice.
Save the restrictions rule.
Do either of the following:
rule without activating it. This option is only available for inactive,
cloned, or new rules. When you are ready to activate the rule, select
the rule from the
and then click
the rule to activate it immediately.
saving or applying a rule, you can return to the