4.2 More Information

For more detailed information about the capabilities and employment of Endpoint Security and Mobile Management policies, reference the following documents: