Security Policies

On the Shield Guard portal, once you assign a security policy to a device, the portal applies it to the Shield Guard Agent app on that device. The policy runs continuously, constantly checking the device’s security status compared to its configuration.

To create and maintain Shield Guard security policies, use the Policies page. This page includes the following:

  • Policies table - A table listing all security policies in the current account. The table provides information on, and action options for, each device.

  • Policy count - At the top of the Policies table, a counter displays the total number of security policies in the current Shield Guard Service account.

  • + CREATE button - This button provides access to the Create a New Policy page.

To access the Policies page, click on Policies in the Navigation pane. The Policies page appears, as in the following illustration:


Policies Table

The Policies page includes the Policies table, which lists all existing security policies in the current account. The table provides the following information for each device:

  • Policy Name - The name of the policy.

  • Last Modified - The date on which the policy was last modified.

The Policies table also provides access to several action options for each item in the table.

Shield Guard Standard Security Policy

The Shield Guard portal includes a standard security policy you can use in any way that meets your needs. The following illustration shows the View Policy page showing the settings for the Standard Policy:


For the Standard Policy, all security settings are enabled. You have the following options:

  • Assign the policy to one or more devices as-is, without modifications.

  • Modify the security settings and assign the policy to one or more devices.

  • Rename the policy and assign it to devices under the new name, with or without modifications to security settings.

Note: You can also create a new policy from scratch.

Action Options in the Policies Table

In addition to information on each policy, the Policies table provides access to several action options you can use to modify a policy and/or apply it to a device. Click on the associated button to access the action. The following table lists the action options available for each policy.

Action Icon Function
Assign Policy - Accesses the Assign Policy to Devices window.
Show Policy - Accesses a read-only version of the Edit Policy page.
Edit Policy - Accesses the Edit Policy page.
Delete Policy - Deletes the policy. This button is active only if the policy is not currently assigned to a device.

Assign Policy to Devices Window

This window appears when you click on the Assign Policy button for a policy in the Policies table.

To assign a security policy to one or more devices, click the drop-down and select a device from the list that appears. The drop-down list disappears and the Assign button activates. To add additional devices, repeat this process for each device. When finished, click on the Assign button. You return to the Policies page. If you now access the Devices page, you can see the policy you assigned is now listed in the Policy Name column for each device you selected for policy assignment.

The following shows two devices having been selected for policy assignment, with the Assign button active.

View Policy Page

This page appears when you click on the Show button for a policy in the Policies table. It displays a read-only version of the selected policy. To edit the policy, click on the Edit button in the upper-right of the page. The Edit Policy page appears where you can edit the policy.

The following illustration of the View Policy page shows the top portion of a security policy called “Second Floor”.

Creating Policies

To create a new security policy, access the Policies page, where you have the following options when creating a policy:

  • Create a new policy from scratch - Click on the + CREATE button to access the Create a New Policy page.

  • Renaming an existing policy - Click on the Edit button associated with the policy you want to rename. The Edit Policy page appears where you can rename and otherwise modify the policy to suit your preferences.

Create a New Policy Page

To create a new policy from scratch, access the Policies page and click on the + CREATE button. The Create a New Policy page appears:


For new policies, all settings are disabled by default. For information on naming, configuring, and saving policies, see the Editing Policies section.

Editing Policies

Note: This section describes the Edit Policy page. However, when creating new policies, you can reference this section. Functionality between the Edit Policies page and the Create a New Policy page is identical except for the following:

  • On the Create a New Policy page, the Show button, providing access to the View Policy page, is not available.

Edit Policy Page

This page appears when you click on the Edit button for a policy in the Policies table. It displays an editable version of the selected policy. To access a read-only version of the policy, click on the Show button in the upper-right of the page. The View Policy page appears, where you can return to the Edit Policy page by clicking on the Edit button.

You can change the policy name and/or enable or disable one or more security settings. Many settings have additional options allowing you to fine-tune your preferences.

The following illustration of the Edit Policy page shows a security policy called “Second Floor” where the policy name has been changed to “Second Floor - East” and the Admin Password security setting has been enabled.


On the Edit Policy page, the following options are available:

  • Name your policy - Use this field to specify a meaningful name for the policy. This is a required field.

  • Policy Settings Table - This table lists all available security settings - the same options that are available in the Standard Policy. The table contains the following columns:

    • Enable - The toggle switch in this column enables or disables the associated security setting for the current policy. To enable a disabled setting, click on this toggle switch. Similarly, to disable an enabled setting, click on this toggle switch.

      Once you enable a security setting, if additional options exist for the setting, the Additional Options field activates and becomes a required field. You must either select a configuration option or disable the setting before you can save the policy.

    • Security Settings - This column lists all the available security settings along with a brief description.

    • Additional Options - This column shows the additional configuration options (if any) available for each security setting. Once you enable a setting for which additional options are available, the Additional Options field activates and becomes a required field for the policy. If you exit the field without making a selection, the field name turns red and you must either specify a valid response or disable the setting before you can save the policy.

  • Save - This button is inactive until all required fields contain valid responses. If you click on this button when it is active, your current configuration is preserved and you return to the Policies page where the policy appears in the Policies table. To exit the page without saving, you can either navigate to another page or click on the browser’s Back button.

A Note on Required Fields and Saving Security Policies

On the Edit Policy page (and the Create a New Policy page, as well), the Save button is inactive until all required fields contain valid responses. Any required fields still needing a value display in red. The following fields are required on the Policies page:

  • Name your policy - Each policy requires a unique name.

  • Additional Options - If you enable a setting for which additional options exist, the Additional Options field for that setting activates and becomes a required field for the policy.

    In the illustration below, the Create a New Policy page appears. Note the following:

  • The Name your policy field displays in red, indicating it is a required field awaiting a valid response.

  • For the Auto Document Deletion setting, the Additional Options field displays in red, indicating the setting has been enabled and the field is awaiting a valid response.

  • The Encrypted PDF Deletion setting has been enabled and it’s Additional Options field displays the configuration options.