These sections describe some best practices for deploying security policies and how to create, test, assign, and view them.
Deployment Best Practices
Creating Security Policies
Testing Security Policies
Assigning Security Policies
Viewing Effective Policies