Because of the flexibility in assigning security policies to users, devices, and the Management Zone, it is possible for multiple security policies of the same type to be applied to a device through different sources. For example, one Firewall policy might be assigned to a device, a second Firewall policy to the device’s user, and a third Firewall policy to a device group in which the device is a member. Because of multiple assignments, the ZENworks system must determine the effective policy for the device. The Endpoint Security Agent can then enforce the one effective policy on the device. How the Effective Policy is Determined explains the process used to determine an effective policy.
You can view a device’s effective policies through the Agent Status in the Endpoint Security Agent on the device. This requires the Endpoint Security Agent to have an override password assigned through a Security Settings policy.
For information about using the Endpoint Security Agent to view effective policies, see Viewing Effective Policies
in the ZENworks Endpoint Security Agent Reference.