The following examples demonstrate how to properly define permissions, audit and shadowing rules in DeviceLock.
All examples assume you are using the DeviceLock Management Console connected to a computer running the DeviceLock Service. For more information on how to use the DeviceLock Management Console, see
DeviceLock Consoles and Tools.