Use ºÚÁϺ£½Ç91Èë¿Ú policies to remotely manage devices in your organization, customizing managed devices and keeping them secure and in compliance. You can save time by creating ºÚÁϺ£½Ç91Èë¿Ú policies to remotely apply a set of rules to one managed device, a group of devices, or your entire fleet.
As an IT Admin, you can also add multiple policies to a new policy group and assign the policy group to a device group. A policy group can save you time by letting you implement security or compliance-related issues on a large number of managed devices. A policy group is especially useful in implementing security or compliance-related issues on managed devices. A good practice is to create OS-specific policies.
After a policy takes effect, you can view a policy's status or review the log file to determine if the policy requires additional changes. After you apply a policy, the ºÚÁϺ£½Ç91Èë¿Ú agent on an individual device continuously compares the local policy with the policies you set in ºÚÁϺ£½Ç91Èë¿Ú. If a user modifies the device policy, ºÚÁϺ£½Ç91Èë¿Ú automatically modifies the device's policy to comply with the ºÚÁϺ£½Ç91Èë¿Ú policy. This process ensures that ºÚÁϺ£½Ç91Èë¿Ú policies and local devices are kept in sync. ºÚÁϺ£½Ç91Èë¿Ú policies do not support non-English locales.
Applying policies lets you customize these types of managed devices and make them more secure:
- Windows
- MacOS
- iOS and iPadOS
- Linux
- Android
Some policies you create provide a list of options for you to specify, enable, or disable. For example, when you create a policy for Windows devices to control the use of Help, you can configure the following settings:
- Restrict potentially unsafe HTML Help functions to specific folders
- Restrict programs from being launched from Help
- Turn off Data Execution Prevention for HTML Help Executable
If you want to implement zero trust security, a conditional access policy secures access to resources based on conditions by user or user group. See Get Started: Conditional Access Policies.