10.0 Policy Enforcement Workflow

After a policy is assigned to a device, the policy enforcement workflow on the device depends on the device type (standard or self-encrypting):