After creating a device control rule, the next step is deploying it. Deploying a policy ensures device control rules are enforced on endpoints, enabling real-time monitoring and management of peripheral devices connected to your network. This safeguards sensitive data by controlling data transfers to unauthorized devices, strengthening security across all endpoints.
In a computer group, the associated policy applies only to computers with the matching OS platform.
To learn more about creating computer groups, Click here
To exclude specific user groups within a computer group:
Thank you for your feedback!
Sorry about that!