Because of the flexibility in assigning security policies to users, devices, and the Management Zone, it is possible for multiple security policies of the same type to be applied to a device through different sources. For example, one Firewall policy might be assigned to a device, a second Firewall policy to the device’s user, and a third Firewall policy to a device group in which the device is a member. Because of multiple assignments, the ZENworks system must determine the Section 5.0, Effective Policies explains the process used to determine an effective policy.policy for the device. The Endpoint Security Agent can then enforce the one effective policy on the device.
There are two ways that you can view a device’s effective policies:
ZENworks Control Center report: If you have ZENworks Reporting Server installed, you can use the Effective Policy report to view a device’s effective policies through ZENworks Control Center. For instructions, see Section V, Policy Reports.
ZENworks Endpoint Security Agent: You can view a device’s effective policies through the Agent Status in the Endpoint Security Agent on the device. This requires the Endpoint Security Agent to have an override password assigned through a Security Settings policy.