A profile can make use of existing firewall, wireless client role, and WIPS policies and apply them to the profile‘s configuration. This affords each profile a truly unique combination of data protection policies for best meeting the data protection requirements of the profile it supports. However, as deployment requirements arise, an individual device may need some or all of its general security configuration overridden from the profile‘s settings.
To configure a profile‘s security settings and overrides: