Skip to main content
All CollectionsPolicy ManagementHow TosAdvanced Policy [Early Access]
Best Practices for Device Categories [Early Access]
Best Practices for Device Categories [Early Access]
Updated over a month ago

The new Advanced Policy Framework offers a more flexible, hierarchical approach to managing policies, with a focus on automation and efficiency. This guide will help you understand the differences between the group-based policy and the new advanced policy, along with some recommendations on how to organize your assets effectively so that you make the most of this powerful framework.

Key Changes in the Advanced Policy

Device Categories as Folders

Think of device categories as “folders” that let you organize assets, without the need for any conditions. Unlike with an asset group, you do not have to set conditions that an asset needs to meet in order for it to fall into a device category.

Flexible Policy Association

In the older group-based system, changes to client tiers or services required updating custom fields or groups, which could lead to errors if fields were missed, and was a tiresome task to do. Now, assets flow freely between device categories without any conditions, since they are essentially “folders” that automatically inherit the correct policies, based on the policy association.

Two-way Policy Inheritance

Policies are organized into a parent-child hierarchy where the root policies apply to all assets in a category. Child policies allow specific changes without reconfiguring the entire set and reducing time and effort required in setting up your use-case based policies. Policies set up at the root are automatically inherited downwards, with their status maintained. On the other hand, if a new policy is introduced at a child level, the same is inherited backwards as well, in the disabled state.

One Device, One Policy

With the advanced policy, every device is associated to only one policy, without any policy overlaps or clashes. Since every device falls under a unique device category, multiple policy sets will never apply for the same device. This single policy method gets rid of confusion, minimizes the need for overrides, improves visibility and makes asset management a lot more efficient.

Sample Policy Setup

Let’s look at a few sample setups to see how you can organize your asset groups into device categories in the advanced policy, based on a few use-cases.

1. Client-Based Policies

Let’s look at an example of an MSP that caters to schools, and has over 20 managed clients in SuperOps. This MSP does not charge clients based on plans, but rather has custom contracts for each client. Because of this, some clients may need specific policies that are customized just for them, while 3-4 clients with similar contracts will follow the same policy.

The MSP manages Windows workstations for all their clients, since they cater to schools, they take care of both student and staff machines that are connected to the school’s network.

GROUP BASED POLICY SETUP

Here’s what the setup would look like:

Filter Conditions:

Client is {Client} + Client does not include {exceptions} + Platform Category is Windows + Device Type is {Staff/Server}

Policy Associations:

Asset Group

Policy Set

Stark Industries - Staff

Stark Industries - Staff Policy

Stark Industries - Students

Stark Industries - Students Policy

Stark Industries - Workstations

Stark Industries - Workstations Policy

Dunder Mifflin - Staff

Dunder Mifflin - Staff Policy

Dunder Mifflin - Students

Dunder Mifflin - Students Policy

Dunder Mifflin - Workstations

Dunder Mifflin - Workstations Policy

In the group-based policy, the MSP will need to create separate asset groups and policy sets for each school, and under each school, for staff and student separately. They will also need to keep in mind that any changes to policies that are common between staff and student policies of a school will have to be changed together, if there are any changes in the contract of that school.

This can lead to a lot of confusion and lead to errors if the updates are not done correctly. Besides, it is cumbersome to have to repeat the same configurations for every single school, even for ones that do not have any client-level customizations.

These drawbacks mean that the group-based policy is not the ideal framework for such a complex setup. Let’s now look at how the advanced policy framework simplifies things and helps the MSP set up an efficient, organized, and easy-to-manage policy demography.

ADVANCED POLICY SETUP

Here is where the advanced policy’s powerful capabilities come into the picture. The MSP can start by defining a root Workstation Policy that will include all their standard alerts, patches, software, and more. Under the root, the MSP can define two policy sets - Staff Policy, Student Policy. These two can include all the standard policies that a staff machine and a student machine will require. For example, staff policy could include software such as Zoom, Figma. Whereas, the student policy could include Google Drive, ChatGPT.

Now, for client-specific customizations, the MSP can simply define further child policy sets under the Staff and Student parent policy sets. For Dunder Mifflin, the MSP can define “Dunder Mifflin - Staff” and “Dunder Mifflin - Student”, and override the policies here. Similarly, the MSP can define as many child policy sets as required, based on the number of client-specific customizations they need.

Student Policy Hierarchy

Staff Policy Hierarchy

Schools that don’t need specific customizations will be governed by the parent policy sets directly (Staff Policy & Parent Policy).

Filter Conditions:

None, since device categories are condition-agnostic “folders”.

Policy Associations:

Here’s how the policy associations could work for three of their clients: Stark Industries, Dunder Mifflin, Acme Inc.

Client: Stark Industries

Device Category

Policy Set

Windows Workstations

Windows Workstation Policy

Staff Workstations

Stark Industries - Staff

Student Workstations

Stark Industries - Student

Client: Dunder Mifflin

Device Category

Policy Set

Windows Workstations

Windows Workstation Policy

Staff Workstations

Dunder Mifflin - Staff

Student Workstations

Dunder Mifflin - Student

Client: Acme Inc

Device Category

Policy Set

Windows Workstations

Windows Workstation Policy

Staff Workstations

Staff Policy

Student Workstations

Student Policy

Overall Policy Hierarchy

2. Condition-Based Policies

In this example, the policies are set up based on the contract plan that a client has purchased, the device manufacturer, and customizations on the antivirus policy. Let’s take a closer look below.

GROUP BASED POLICY SETUP

Filter Conditions:

Agreement level (client) + platform category + client custom field(s) + asset custom field(s)

Policy Associations:

Asset Group

Policy Set

Gold Plan - Dell - SentinelOne - Windows Server

Gold Plan - Dell - SentinelOne Policy

Silver Plan - Dell - Webroot - Windows Server

Silver Plan - Dell - Webroot Policy

In this scenario, you would have to create two separate asset groups with filter conditions to be checked for an asset to fall into it. Corresponding to each asset group, you will need to create policy sets manually, by configuring every individual alert, script, patch, and antivirus policies.

ADVANCED POLICY SETUP

Filter Conditions:

None, since device categories are condition-agnostic “folders”.

Policy Associations:

Device Category

Policy Set

Windows Server (Default)

Windows Server Policy (Root)

Dell Server (Custom)

Dell + SentinelOne Policy (Child)

Dell Server (Custom)

Dell + Webroot Policy (Child)

With the advanced policy, you can simply configure all your alerts, scripts, and patches at the root policy level and let the framework automatically pass on the configurations to its child policy sets. You can always customize settings at any of the child levels, which is what is done in this example.

For assets that fall under the Gold Plan, the policy set associated with this asset has SentinelOne enabled as the antivirus. Similarly, for Silver Plan, the antivirus is going to be Webroot. In this fashion, you can customize your inherited policies at the child levels as required.

Overall Policy Hierarchy

Root Policy: Windows Servers

Applies to all Windows servers across all clients, including patching logic, alerting, and scheduled scripts. Antivirus is not defined at this level.

Child Policy 1: Dell - SentinelOne

Inherits all root-level settings, but you can add custom alerts or scripts specific to Dell servers and enable SentinelOne as the antivirus for this policy.

Child Policy 2: Dell - Webroot

This is a child of Dell - SentinelOne, where Webroot is turned on, and SentinelOne is disabled.

Did this answer your question?