Knowledge Base
/ Installation & Setup
How to View Which Policies Are Applied to the Endpoint Agent
During daily operation, maintenance and troubleshooting […]
Last updated: Mar 27, 2026
During daily operation, maintenance and troubleshooting, administrators often need to confirm which policies are currently in effect on a certain endpoint, whether the policies have been successfully delivered, and the specific functions corresponding to the policy numbers. This article provides two commonly used viewing methods: server Management Console viewing and endpoint agent local viewing to facilitate quick verification in different scenarios.
- Method 1: View from the server endpoint list
- Method 2: View locally from the endpoint agent
Method 1: View from the Ping32 Management Console
- Run the Ping32 Management Console to enter Endpoint List, double-click the endpoint where you want to view the policy, click More in the endpoint overview on the right, and select Policy Information.
- View the policy information of the target endpoint
Method 2: View locally from the endpoint agent
- Open Command Prompt (CMD) on the endpoint agent computer and enter the command
nsec -setting. - Enter the password in the pop-up window (please ask the staff for the password) and click “OK”.
- After entering the setting interface, click the System tab.
- View “Policy” at the bottom of the page, and confirm based on the policy number and the name of the policy function (as shown below).
Attachment: Function description corresponding to the policy ID
Network related
- 101: Browse website audit
- 102: Website access control
- 103: Web page sensitive word blocking
- 121: Email Audit
- 122: Email control
- 131: HTTP POST control
- 132: HTTP control
System related
- 151: System component control
- 152: Disable system services
- 161: Software blacklist
- 162: Software whitelist
- 163: Pirated software detection
- 164: Software change alarm
- 165: Software installation prohibited
- 166: Internet access is prohibited if certain software is not installed
- 167: App Store
- 168: UWP software management
- 171: Network access control
- 172: Illegal outreach
- 173: Trusted Network
- 174: Network flow control
- 175: Network traffic statistics
- 176: Network security domain
- 180: HTTP/HTTPS application layer network request control
DLP related
- 201: Local file operation audit
- 203: Document outgoing control
- 204: Control of sending method of right-click menu
- 205: Sensitive words
- 206: Document operation control
- 207: New file outgoing control
- 208: File transfer watermark
- 209: Added document outsourcing control for document outgoing approval application
- 210: Leak tracking, local file operation audit (leak tracking extension = old leak tracking + file operation audit + document transfer watermark)
- 211: Screen capture control
- 212: Screen watermark
- 213: Window watermark
- 214: Smart screenshot
- 215: Screen recording
- 216: Trigger screenshot
- 221: Print log audit
- 222: Printing control
- 223: Print watermark
- 231: Clipboard audit
- 232: Disable clipboard
- 233: Delete files in certain locations regularly
Device Management
- 216: Triggered screenshot
- 251: U disk permission control
- 252: Disk encryption
- 253: U disk alarm
- 254: Automatic encryption and decryption of USB disk files
- 255: USB disk storage audit
- 261: USB port control
- 262: Hardware change alarm
- 263: Disable device
Document encryption
- 301: Document encryption default policy
- 351: Document backup
- 352: Document backup
Others
- 801: Desktop Personalization
- 802: Work order management
- 803: Sensitive content scanning
- 804: Shared Perception
On this page