Implementation Guide › Preparing Your Endpoint Implementation › Deciding on the Policy Objects to Protect
The following sections describe some of the important objects that can be used by your security policy to authorize access to your enterprise applications and data.