Secure Mobile Access 12.4 Deployment Guide

Table of Contents

Security Administration

Administering your security policy involves defining resources and then creating access control rules that determine the availability of those resources.