Using the security policies
All the policies that are created in IBM® MaaS360® are displayed on the Policies page. From the List view, you can filter, sort, search, delete, or export the security policies.
| Option | Description |
|---|---|
| Name |
Security policy name. You can do the following quick actions.
Hover over the information icon to view the number of devices that use the policy. |
| Status | The status of the policy. Devices receive only published policies. |
| Type | The platform that the policy is designed for. Different platforms use different policy options. |
| Add Policy | Create a policy. |
| Precedence | The policy precedence indicates which policy must be applied to the device when multiple policies of the same type are pushed to the device. For more information, see Using policy precedence on devices. |
| More |
|
| Summarize | The summarize feature provides administrators with a concise overview of the current policy settings. This summary encapsulates the key elements of the current policy settings, allowing administrators to quickly assess the compliance and security posture. For more information, see Understanding Summarize and Recommendations feature in MaaS360. |
| Recommendations | The recommendations feature assists administrators in managing device security and compliance. The feature assesses the configuration of device policies, such as the device password policy, and identifies risks that are associated with noncompliance. It provides insights into the potential impacts of not implementing recommended policies, emphasizing the importance of securing sensitive information. For more information, see Understanding Summarize and Recommendations feature in MaaS360. |