Policy Management
By configuring policies, end user desktops can implement different capabilities, such as the permission control on data transmission and peripheral access.
Policies are classified into common policies that meet common office requirements and advanced policies that are customized for special scenarios.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.