Previous Topic: Configuration PolicyNext Topic: Configuration Policy Settings


Maintaining IT Assets Using Configuration Policies

As your system collects a large amount of valuable data for IT administration, it may exceed certain threshold values or cause events to occur. In such cases, by assigning configuration policies to computers and groups, you can maintain your IT assets and take action on critical data or on potential problems, such as low free-disk space, installation of nonapproved software applications, or hardware components being added or removed without authorization. Be aware of the following considerations when analyzing your policy needs and configuring plug-in components.