As your system collects a large amount of valuable data for IT administration, it may exceed certain threshold values or cause events to occur. In such cases, by assigning configuration policies to computers and groups, you can maintain your IT assets and take action on critical data or on potential problems, such as low free-disk space, installation of nonapproved software applications, or hardware components being added or removed without authorization. Be aware of the following considerations when analyzing your policy needs and configuring plug-in components.
|
Copyright © 2013 CA.
All rights reserved.
|
|