Previous Topic: Preparing Your Endpoint Implementation

Next Topic: Users

Deciding on the Policy Objects to Protect

The following sections describe some of the important objects that can be used by your security policy to authorize access to your enterprise applications and data.