Secure Mobile Access 12.4 Deployment Guide

Security Administration

Administering your security policy involves defining resources and then creating access control rules that determine the availability of those resources.

Was This Article Helpful?

Help us to improve our support portal

Techdocs Article Helpful form

  • Hidden
  • Hidden

Techdocs Article NOT Helpful form

  • Still can't find what you're looking for? Try our knowledge base or ask our community for more help.
  • Hidden
  • Hidden