I was wondering about the written policy(s) you have provided to your end users. How exhaustive are they? Do they cover every item that can be seen in the console? Or is it just around we monitor X, Y, Z
@rkrzyston our policy simply covers acceptable use and also metnions that internet,email and device activity is monitored. We dont use systems manager on BYOD devices only company owned devices, we provide a seperate network and internet connection for BYOD devices.
Meraki CMNO, Ruckus WISE, Sonicwall CSSA, Allied Telesis CASE & CAI