

Implementation Guide › Preparing Your Endpoint Implementation › Deciding on the Policy Objects to Protect › Groups › Security Policies and Groups
Security Policies and Groups
When developing a security policy for your organization, you should decide:
- What groups to create for security administration purposes
- Which users to join to each group
- Whether to define group administrators and group password managers, and if so, which users to give these administrative roles
Copyright © 2013 CA Technologies.
All rights reserved.
 
|
|