Appendix: Examples : Permission and Audit Examples for Devices
  
Permission and Audit Examples for Devices
The following examples demonstrate how to properly define permissions, audit and shadowing rules in DeviceLock.
All examples assume you are using the DeviceLock Management Console connected to a computer running the DeviceLock Service. For more information on how to use the DeviceLock Management Console, see DeviceLock Consoles and Tools.