Configuring Security Policies


Security policies determine the various security restrictions that can be imposed on the users in a network. The security settings for Active Desktop, Computer, Control Panel, Explorer, Internet Explorer, Network, and System categories can be defined using Security Policies Configuration.

Step 1: Name the Configuration

Provide a name and description for the Security Policies Configuration.

Step 2: Define Configuration

Specify the following values:

Parameter Description

Choose Policy Category

The specific policy area in which the security policy will be applied. Select the desired category from left. This displays the relevant security polices. For details on the each category, refer to Windows Help documentation. For details on the each policy in the Select the Policy list, refer to Security Policies topic.

Policy Value

To enable, disable, or to leave it unconfigured, select the appropriate option.


1. To modify a security policy from this table, select the appropriate row, click icon and change the required values.
2. To delete a security policy from this table, select the appropriate row and click icon.


Step 3: Define Target

Using  the Defining Targets procedure, define the targets for deploying the Security Policies Configuration.

Step 4: Deploy Configuration

Click the Deploy button to deploy the defined Security Policies Configuration in the defined targets. The security policies will be applied during the next user logon.

To save the configuration as draft, click Save as Draft.

See also : Managing Configurations and Collections, Viewing Configuration Reports, Defining Targets, Security Policies
Copyright © 2018, ZOHO Corp. All Rights Reserved.