ZENworks 11 SP2 Endpoint Security Policies Reference

  ZENworks 11 SP2 Endpoint Security Policies Reference
    Concepts
      Security Policies vs. Configuration Policies
      Types of Security Policies
      Locations
      User, Device, and Zone Policy Assignments
      Effective Policies
        Ordering
        Merging
      Policy Versioning
      Session Support
    Policy Deployment
      Deployment Best Practices
      Creating Security Policies
      Testing Security Policies
        Designating Test Devices
        Assigning Policies to Test Devices
      Assigning Security Policies
        Assigning Policies to Users
        Assigning Policies to Devices
        Assigning Policies to the Management Zone
      Viewing Effective Policies
    Policy Management
      Editing a Policy’s Details
      Defining a Policy’s System Requirements
        Filter Conditions
        Filter Logic
      Publishing Policies
        Republishing an Old Version
        Publishing a Sandbox Version
      Renaming, Copying, and Moving Policies
        Renaming a Policy
        Copying a Policy
        Moving a Policy
      Enabling and Disabling Policies
        Disabling a Policy
        Enabling a Policy
      Replicating Policies to Content Servers
      Importing and Exporting Policies
        Exporting a Policy
        Importing a Policy
      Managing Policy Groups
        Creating Policy Groups
        Adding Policies to Existing Groups
        Renaming Policy Groups
        Moving Policy Groups
        Deleting Policy Groups
    Policy Removal
      Removal Best Practices
      Removing Policy Assignments From Users and Devices
        Removing Multiple Policy Assignments From the Same Object
        Removing a Single Policy Assignment From Multiple Objects
      Removing Policy Assignments From the Management Zone
      Deleting Policies
      Deleting Versions of a Policy
    Policy Reports
      Configuring Reporting Settings
      Generating Reports
        Predefined Reports
        Viewing a Predefined Report
        Viewing the Effective Policy Report for a Device
    Data Encryption Key Management
      About Data Encryption Keys
        Active Key
        Multiple Zones
        Key Security
      Generating a New Encryption Key
      Exporting Encryption Keys
      Importing Encryption Keys
    Appendixes
      Security Policy Settings
        Application Control Policy
        Communication Hardware Policy
        Data Encryption Policy
        Firewall Policy
        Location Assignment Policy
        Scripting Policy
        Security Settings Policy
        Storage Device Control Policy
        USB Connectivity Policy
        VPN Enforcement Policy
        Wi-Fi Policy
      Security Policy Summary
      Naming Conventions in ZENworks Control Center
      Documentation Updates
        October 2013: ZENworks 11 SP2 (11.2.4)
        March 2013: Update to ZENworks 11 SP2 (11.2.3)
        November 05, 2012: Update to ZENworks 11 SP2 (11.2.2)
        March 20, 2012: Support Pack 2
    Legal Notices