13.0 Understanding DRA Policy

DRA enables you to configure various policies that help you secure your enterprise and prevent data corruption. These policies work within the context of the dynamic security model, ensuring that policy enforcement automatically keeps up with your changing enterprise. Establishing policies, such as naming conventions, disk usage limits, and property validation allows you to enforce rules that help maintain the integrity of your enterprise data.

In DRA you can quickly define policy rules for these enterprise management areas:

  • Microsoft Exchange

  • Office 365

  • Home directory

  • Password generation

DRA also supplies built-in policies for groups, user accounts, and computers.

To manage or define policies, you must have the appropriate powers, such as those included in either the DRA Admins or Manage Policies and Automation Triggers roles. To help you manage your policies, DRA provides the Policy Details report. This report provides the following information:

  • Indicates whether the policy is enabled

  • Lists associated operations

  • Lists objects governed by this policy

  • Provides policy scope details

You can use this report to ensure that your policies are defined properly. You can also use this report to compare policy properties, catching conflicts and better enforcing policies across your enterprise.