Previous Topic: Preparing Your Endpoint ImplementationNext Topic: Users


Deciding on the Policy Objects to Protect

The following sections describe some of the important objects that can be used by your security policy to authorize access to your enterprise applications and data.