How to View Which Policies Are Applied to the Endpoint Agent – NSecsoft
Knowledge Base
Knowledge Base / Installation & Setup
How to View Which Policies Are Applied to the Endpoint Agent

During daily operation, maintenance and troubleshooting […]

Last updated: Mar 27, 2026

During daily operation, maintenance and troubleshooting, administrators often need to confirm which policies are currently in effect on a certain endpoint, whether the policies have been successfully delivered, and the specific functions corresponding to the policy numbers. This article provides two commonly used viewing methods: server Management Console viewing and endpoint agent local viewing to facilitate quick verification in different scenarios.

  • Method 1: View from the server endpoint list
  • Method 2: View locally from the endpoint agent

Method 1: View from the Ping32 Management Console

  1. Run the Ping32 Management Console to enter Endpoint List, double-click the endpoint where you want to view the policy, click More in the endpoint overview on the right, and select Policy Information.
  2. View the policy information of the target endpoint

Method 2: View locally from the endpoint agent

  1. Open Command Prompt (CMD) on the endpoint agent computer and enter the command nsec -setting.
  2. Enter the password in the pop-up window (please ask the staff for the password) and click “OK”.
  3. After entering the setting interface, click the System tab.
  4. View “Policy” at the bottom of the page, and confirm based on the policy number and the name of the policy function (as shown below).

Attachment: Function description corresponding to the policy ID

Network related

  • 101: Browse website audit
  • 102: Website access control
  • 103: Web page sensitive word blocking
  • 121: Email Audit
  • 122: Email control
  • 131: HTTP POST control
  • 132: HTTP control

System related

  • 151: System component control
  • 152: Disable system services
  • 161: Software blacklist
  • 162: Software whitelist
  • 163: Pirated software detection
  • 164: Software change alarm
  • 165: Software installation prohibited
  • 166: Internet access is prohibited if certain software is not installed
  • 167: App Store
  • 168: UWP software management
  • 171: Network access control
  • 172: Illegal outreach
  • 173: Trusted Network
  • 174: Network flow control
  • 175: Network traffic statistics
  • 176: Network security domain
  • 180: HTTP/HTTPS application layer network request control

DLP related

  • 201: Local file operation audit
  • 203: Document outgoing control
  • 204: Control of sending method of right-click menu
  • 205: Sensitive words
  • 206: Document operation control
  • 207: New file outgoing control
  • 208: File transfer watermark
  • 209: Added document outsourcing control for document outgoing approval application
  • 210: Leak tracking, local file operation audit (leak tracking extension = old leak tracking + file operation audit + document transfer watermark)
  • 211: Screen capture control
  • 212: Screen watermark
  • 213: Window watermark
  • 214: Smart screenshot
  • 215: Screen recording
  • 216: Trigger screenshot
  • 221: Print log audit
  • 222: Printing control
  • 223: Print watermark
  • 231: Clipboard audit
  • 232: Disable clipboard
  • 233: Delete files in certain locations regularly

Device Management

  • 216: Triggered screenshot
  • 251: U disk permission control
  • 252: Disk encryption
  • 253: U disk alarm
  • 254: Automatic encryption and decryption of USB disk files
  • 255: USB disk storage audit
  • 261: USB port control
  • 262: Hardware change alarm
  • 263: Disable device

Document encryption

  • 301: Document encryption default policy
  • 351: Document backup
  • 352: Document backup

Others

  • 801: Desktop Personalization
  • 802: Work order management
  • 803: Sensitive content scanning
  • 804: Shared Perception
On this page