Reference Guide
137
Manage Policies
Manage Security Policies
You can apply security policies at the Enterprise, Domain, User Group, User, Endpoint Group, and Endpoint
levels. Default policy settings allow your enterprise to get started with Dell security, but you should customize
the security and configuration settings. If you've migrated from an earlier version of Dell Server, your policy
settings have been migrated for you.
Security policies are grouped by technology. Click a technology group to view its policies and policy
descriptions.
Windows Encryption
Threat Prevention
Mac Encryption
Full Disk Encryption (FDE) Advanced Threat Prevention Dell Volume Encryption
Self-Encrypting Drive (SED) Threat Protection Mac Global Settings
Policy-Based Encryption Web Protection
BitLocker Encryption Client Firewall
Server Encryption Protection Settings
Authentication
Removable Media
Encryption
Port Control
Pre-Boot Authentication Windows Media Encryption Windows Port Control
Windows Authentication Mac Media Encryption Windows Device Control
Media Encryption Settings
Data Guardian
Global Settings
Cloud Encryption Settings
Protected Office Documents
Content Based Protection
Mobile Client
Web Portal
Settings
The following override information displays at the top of the Security Policies page:
Override count - the number of policy settings that are changed from their default settings.
Uncommitted overrides - the number of changes from default settings that are not yet committed.
NOTE: The Security Policies page for a population displays overrides to localizable policies in the browser
language only.