1.3 How Network Locations Operate

The ZENworks Agent is location aware. This means that the agent can compare its current network environment against locations you defined. If the network environment matches one of the defined locations, the agent assigns that location to the device. If the network environment does not match a defined location, the agent assigns the Unknown location to the device.

The Endpoint Security Agent inherits the location assignment from the ZENworks Agent. This enables the Endpoint Security Agent to enforce different security policies at different locations. For example, you might choose to enforce different firewall settings for a stationary device located within your corporate office than for a mobile device that moves among less secure, unknown locations.

Several security policies can be designated as either location-based policies or global policies. A location-based policy is applied only if the device’s location matches one of the locations identified in the policy. A global policy is applied regardless of the device’s location.

NOTE:Ensure that you have assigned the Location Assignment Policy for the ZESM location-based policies to be enforced on the device.

Global-only Policies

Global or Location-based Policies

Antimalware Enforcement

Application Control

Antimalware Custom Scan

Communication Hardware

Antimalware Network Scan

Firewall

Antimalware Scan Exclusions

Storage Device Control

Location Assignment

USB Connectivity

Microsoft Data Encryption

Wi-Fi

Scripting

 

 

Security Settings

 

 

VPN Enforcement