Secure Mobile Access 12.4 Administration Guide

End Point Control Scenarios

This section describes some typical End Point Control scenarios that use zones and device profiles to classify connection requests and deploy End Point Control tools to clients.

Was This Article Helpful?

Help us to improve our support portal

Techdocs Article Helpful form

Techdocs Article NOT Helpful form

  • Still can't find what you're looking for? Try our knowledge base or ask our community for more help.