3.2 Secure Windows Devices

View this video to see how to configure and deploy Endpoint Security policies on your Windows devices to manage control of security locations, security override capability, applications, firewalls, communication hardware, VPN security, and Wi-Fi security on those devices.