Choosing or designing the appropriate policies for your organization
As you have seen above, the built-in policies that ship with UAG are simple, but which one should you use? Well, there's no definite catch-all answer, of course, but here are some things that you should take under consideration:
- Whatever policy you choose, remember that it only controls the endpoint computer. An endpoint policy can enhance security, but it's not a replacement for proper user and access control.
- If your users typically use their home computers, remember that they may run whatever they want on them, including things that may be harmful, such as a file-sharing application or a comprehensive collection of worms and spyware.
- Despite the above, beware of choosing or ...