This best practice article explains the relationship between sub-estates and roles. It also provides a starting point to designing sub-estates for your network. This article applies to Endpoint Security and Control, version 9 only.
↧