12.0 Viewing Effective Policies

Because of the flexibility in assigning security policies to users, devices, and the Management Zone, it is possible for multiple security policies of the same type to be applied to a device through different sources. For example, one Firewall policy might be assigned to a device, a second Firewall policy to the device’s user, and a third Firewall policy to a device group in which the device is a member. Because of multiple assignments, the ZENworks system must determine the effective policy for the device. The Endpoint Security Agent can then enforce the one effective policy on the device. Section 5.0, Effective Policies explains the process used to determine an effective policy.

There are two ways that you can view a device’s effective policies: