Getting started

Step 1: Install and configure Protect

Install and configure Protect.

For more information, see Installing Protect.

Step 2: Create policies and rules

Create policies and rules.

For more information, see Creating policies.

Step 3: Enforce policies and prioritize them

Enforce policies and prioritize them.

For more information, see Working with policy enforcement.

Step 4: Target computer groups

Target computer groups.

For more information, see Selecting Protect computer groups.

Step 5: Run reports

Run reports.

For more information, see Running reports.