{"id":876,"date":"2026-03-27T14:29:24","date_gmt":"2026-03-27T06:29:24","guid":{"rendered":"https:\/\/www.nsecsoft.com\/en\/?p=876"},"modified":"2026-03-27T14:29:24","modified_gmt":"2026-03-27T06:29:24","slug":"policy-list","status":"publish","type":"post","link":"https:\/\/www.nsecsoft.com\/en\/course\/policy-list.html","title":{"rendered":"How to View Which Policies Are Applied to the Endpoint Agent"},"content":{"rendered":"<div class=\"el-h2\">\n<p dir=\"auto\" data-heading=\"How to View Which Policies Are Applied to the Endpoint Agent\"><span style=\"font-size: 16px;\">During daily operation, maintenance and troubleshooting, administrators often need to confirm which policies are currently in effect on a certain endpoint, whether the policies have been successfully delivered, and the specific functions corresponding to the policy numbers. This article provides two commonly used viewing methods: <\/span><strong style=\"font-size: 16px;\">server Management Console viewing<\/strong><span style=\"font-size: 16px;\">\u00a0and\u00a0<\/span><strong style=\"font-size: 16px;\">endpoint agent local viewing<\/strong><span style=\"font-size: 16px;\">\u00a0to facilitate quick verification in different scenarios.<\/span><\/p>\n<\/div>\n<div class=\"el-ul\">\n<ul class=\"has-list-bullet\">\n<li dir=\"auto\" data-line=\"0\">Method 1: View from the server endpoint list<\/li>\n<li dir=\"auto\" data-line=\"1\">Method 2: View locally from the endpoint agent<\/li>\n<\/ul>\n<\/div>\n<div class=\"el-hr\"><\/div>\n<div class=\"el-h3\">\n<h4 dir=\"auto\" data-heading=\"Method 1: View from the Ping32 Management Console\"><strong>Method 1: View from the Ping32 Management Console<\/strong><\/h4>\n<\/div>\n<div class=\"el-ol\">\n<ol>\n<li dir=\"auto\" data-line=\"0\">Run the Ping32 Management Console to enter\u00a0<strong>Endpoint List<\/strong>, double-click the endpoint where you want to view the policy, click\u00a0<strong>More<\/strong>\u00a0in the endpoint overview on the right, and select\u00a0<strong>Policy Information<\/strong>.<\/li>\n<li dir=\"auto\" data-line=\"2\">View the policy information of the target endpoint<\/li>\n<\/ol>\n<\/div>\n<div class=\"el-hr\"><\/div>\n<div class=\"el-h3\">\n<h4 dir=\"auto\" data-heading=\"Method 2: View locally from the endpoint agent\"><strong>Method 2: View locally from the endpoint agent<\/strong><\/h4>\n<\/div>\n<div class=\"el-ol\">\n<ol>\n<li dir=\"auto\" data-line=\"0\">Open\u00a0<strong>Command Prompt (CMD)<\/strong>\u00a0on the endpoint agent computer and enter the command\u00a0<code>nsec -setting<\/code>.<\/li>\n<li dir=\"auto\" data-line=\"1\">Enter the password in the pop-up window (please ask the staff for the password) and click &#8220;OK&#8221;.<\/li>\n<li dir=\"auto\" data-line=\"2\">After entering the setting interface, click the\u00a0<strong>System<\/strong>\u00a0tab.<\/li>\n<li dir=\"auto\" data-line=\"3\">View\u00a0<strong>&#8220;Policy&#8221;<\/strong> at the bottom of the page, and confirm based on the policy number and the name of the policy function (as shown below).<\/li>\n<\/ol>\n<\/div>\n<div class=\"el-hr\"><\/div>\n<div class=\"el-h3\">\n<h4 dir=\"auto\" data-heading=\"Attachment: Function description corresponding to the policy ID\"><strong>Attachment: Function description corresponding to the policy ID<\/strong><\/h4>\n<\/div>\n<div class=\"el-h4\">\n<p dir=\"auto\" data-heading=\"Network related\"><strong>Network related<\/strong><\/p>\n<\/div>\n<div class=\"el-ul\">\n<ul class=\"has-list-bullet\">\n<li dir=\"auto\" data-line=\"0\">101: Browse website audit<\/li>\n<li dir=\"auto\" data-line=\"1\">102: Website access control<\/li>\n<li dir=\"auto\" data-line=\"2\">103: Web page sensitive word blocking<\/li>\n<li dir=\"auto\" data-line=\"3\">121: Email Audit<\/li>\n<li dir=\"auto\" data-line=\"4\">122: Email control<\/li>\n<li dir=\"auto\" data-line=\"5\">131: HTTP POST control<\/li>\n<li dir=\"auto\" data-line=\"6\">132: HTTP control<\/li>\n<\/ul>\n<\/div>\n<div class=\"el-h4\">\n<p dir=\"auto\" data-heading=\"System related\"><strong>System related<\/strong><\/p>\n<\/div>\n<div class=\"el-ul\">\n<ul class=\"has-list-bullet\">\n<li dir=\"auto\" data-line=\"0\">151: System component control<\/li>\n<li dir=\"auto\" data-line=\"1\">152: Disable system services<\/li>\n<li dir=\"auto\" data-line=\"2\">161: Software blacklist<\/li>\n<li dir=\"auto\" data-line=\"3\">162: Software whitelist<\/li>\n<li dir=\"auto\" data-line=\"4\">163: Pirated software detection<\/li>\n<li dir=\"auto\" data-line=\"5\">164: Software change alarm<\/li>\n<li dir=\"auto\" data-line=\"6\">165: Software installation prohibited<\/li>\n<li dir=\"auto\" data-line=\"7\">166: Internet access is prohibited if certain software is not installed<\/li>\n<li dir=\"auto\" data-line=\"8\">167: App Store<\/li>\n<li dir=\"auto\" data-line=\"9\">168: UWP software management<\/li>\n<li dir=\"auto\" data-line=\"10\">171: Network access control<\/li>\n<li dir=\"auto\" data-line=\"11\">172: Illegal outreach<\/li>\n<li dir=\"auto\" data-line=\"12\">173: Trusted Network<\/li>\n<li dir=\"auto\" data-line=\"13\">174: Network flow control<\/li>\n<li dir=\"auto\" data-line=\"14\">175: Network traffic statistics<\/li>\n<li dir=\"auto\" data-line=\"15\">176: Network security domain<\/li>\n<li dir=\"auto\" data-line=\"16\">180: HTTP\/HTTPS application layer network request control<\/li>\n<\/ul>\n<\/div>\n<div class=\"el-h4\">\n<p dir=\"auto\" data-heading=\"DLP related\"><strong>DLP related<\/strong><\/p>\n<\/div>\n<div class=\"el-ul\">\n<ul class=\"has-list-bullet\">\n<li dir=\"auto\" data-line=\"0\">201: Local file operation audit<\/li>\n<li dir=\"auto\" data-line=\"1\">203: Document outgoing control<\/li>\n<li dir=\"auto\" data-line=\"2\">204: Control of sending method of right-click menu<\/li>\n<li dir=\"auto\" data-line=\"3\">205: Sensitive words<\/li>\n<li dir=\"auto\" data-line=\"4\">206: Document operation control<\/li>\n<li dir=\"auto\" data-line=\"5\">207: New file outgoing control<\/li>\n<li dir=\"auto\" data-line=\"6\">208: File transfer watermark<\/li>\n<li dir=\"auto\" data-line=\"7\">209: Added document outsourcing control for document outgoing approval application<\/li>\n<li dir=\"auto\" data-line=\"8\">210: Leak tracking, local file operation audit (leak tracking extension = old leak tracking + file operation audit + document transfer watermark)<\/li>\n<li dir=\"auto\" data-line=\"9\">211: Screen capture control<\/li>\n<li dir=\"auto\" data-line=\"10\">212: Screen watermark<\/li>\n<li dir=\"auto\" data-line=\"11\">213: Window watermark<\/li>\n<li dir=\"auto\" data-line=\"12\">214: Smart screenshot<\/li>\n<li dir=\"auto\" data-line=\"13\">215: Screen recording<\/li>\n<li dir=\"auto\" data-line=\"14\">216: Trigger screenshot<\/li>\n<li dir=\"auto\" data-line=\"15\">221: Print log audit<\/li>\n<li dir=\"auto\" data-line=\"16\">222: Printing control<\/li>\n<li dir=\"auto\" data-line=\"17\">223: Print watermark<\/li>\n<li dir=\"auto\" data-line=\"18\">231: Clipboard audit<\/li>\n<li dir=\"auto\" data-line=\"19\">232: Disable clipboard<\/li>\n<li dir=\"auto\" data-line=\"20\">233: Delete files in certain locations regularly<\/li>\n<\/ul>\n<\/div>\n<div class=\"el-h4\">\n<p dir=\"auto\" data-heading=\"Device Management\"><strong>Device Management<\/strong><\/p>\n<\/div>\n<div class=\"el-ul\">\n<ul class=\"has-list-bullet\">\n<li dir=\"auto\" data-line=\"0\">216: Triggered screenshot<\/li>\n<li dir=\"auto\" data-line=\"1\">251: U disk permission control<\/li>\n<li dir=\"auto\" data-line=\"2\">252: Disk encryption<\/li>\n<li dir=\"auto\" data-line=\"3\">253: U disk alarm<\/li>\n<li dir=\"auto\" data-line=\"4\">254: Automatic encryption and decryption of USB disk files<\/li>\n<li dir=\"auto\" data-line=\"5\">255: USB disk storage audit<\/li>\n<li dir=\"auto\" data-line=\"6\">261: USB port control<\/li>\n<li dir=\"auto\" data-line=\"7\">262: Hardware change alarm<\/li>\n<li dir=\"auto\" data-line=\"8\">263: Disable device<\/li>\n<\/ul>\n<\/div>\n<div class=\"el-h4\">\n<p dir=\"auto\" data-heading=\"Document encryption\"><strong>Document encryption<\/strong><\/p>\n<\/div>\n<div class=\"el-ul\">\n<ul class=\"has-list-bullet\">\n<li dir=\"auto\" data-line=\"0\">301: Document encryption default policy<\/li>\n<li dir=\"auto\" data-line=\"1\">351: Document backup<\/li>\n<li dir=\"auto\" data-line=\"2\">352: Document backup<\/li>\n<\/ul>\n<\/div>\n<div class=\"el-h4\">\n<p dir=\"auto\" data-heading=\"Others\"><strong>Others<\/strong><\/p>\n<\/div>\n<div class=\"el-ul\">\n<ul class=\"has-list-bullet\">\n<li dir=\"auto\" data-line=\"0\">801: Desktop Personalization<\/li>\n<li dir=\"auto\" data-line=\"1\">802: Work order management<\/li>\n<li dir=\"auto\" data-line=\"2\">803: Sensitive content scanning<\/li>\n<li dir=\"auto\" data-line=\"3\">804: Shared Perception<\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>During daily operation, maintenance and troubleshooting [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[70],"class_list":["post-876","post","type-post","status-publish","format-standard","hentry","category-course","tag-kb-type-install"],"_links":{"self":[{"href":"https:\/\/www.nsecsoft.com\/en\/wp-json\/wp\/v2\/posts\/876","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nsecsoft.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nsecsoft.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nsecsoft.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nsecsoft.com\/en\/wp-json\/wp\/v2\/comments?post=876"}],"version-history":[{"count":1,"href":"https:\/\/www.nsecsoft.com\/en\/wp-json\/wp\/v2\/posts\/876\/revisions"}],"predecessor-version":[{"id":877,"href":"https:\/\/www.nsecsoft.com\/en\/wp-json\/wp\/v2\/posts\/876\/revisions\/877"}],"wp:attachment":[{"href":"https:\/\/www.nsecsoft.com\/en\/wp-json\/wp\/v2\/media?parent=876"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nsecsoft.com\/en\/wp-json\/wp\/v2\/categories?post=876"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nsecsoft.com\/en\/wp-json\/wp\/v2\/tags?post=876"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}