Grants permissions to define and monitor security policies. Administrative Users who are associated with this role can create, modify and delete Endpoint Protection policies. They can also deploy Endpoint Protection policies to collections, create and modify Alerts and monitor Endpoint Protection status.
Grants permissions to create, manage and deploy company resource access profiles such as Wi-Fi, VPN, Exchange ActiveSync ...
Grants permissions to create, modify, and retire applications. Administrative users who are associated with this role can ...
Grants permissions to define and deploy software updates. Administrative users who are associated with this role can manage ...
Grants permissions to define and monitor Compliance Settings. Administrative users associated with this role can create, ...
Grants permissions to define and monitor security policies. Administrative Users who are associated with this role can create, ...
Grants permissions to deploy applications. Administrative users who are associated with this role can view a list of applications, ...
Grants permissions to manage the Asset Intelligence Synchronization Point, Asset Intelligence reporting classes, software ...
Grants permissions to perform both the Application Deployment Manager role and the Application Author role. Administrative ...
Grants permissions to run and audit the remote administration tools that help users resolve computer issues. Administrative ...