We are independent & ad-supported. We may earn a commission for purchases made through our links.
Advertiser Disclosure
Our website is an independent, advertising-supported platform. We provide our content free of charge to our readers, and to keep it that way, we rely on revenue generated through advertisements and affiliate partnerships. This means that when you click on certain links on our site and make a purchase, we may earn a commission. Learn more.
How We Make Money
We sustain our operations through affiliate commissions and advertising. If you click on an affiliate link and make a purchase, we may receive a commission from the merchant at no additional cost to you. We also display advertisements on our website, which help generate revenue to support our work and keep our content free for readers. Our editorial team operates independently of our advertising and affiliate partnerships to ensure that our content remains unbiased and focused on providing you with the best information and recommendations based on thorough research and honest evaluations. To remain transparent, we’ve provided a list of our current affiliate partners here.
Networking

Our Promise to you

Founded in 2002, our company has been a trusted resource for readers seeking informative and engaging content. Our dedication to quality remains unwavering—and will never change. We follow a strict editorial policy, ensuring that our content is authored by highly qualified professionals and edited by subject matter experts. This guarantees that everything we publish is objective, accurate, and trustworthy.

Over the years, we've refined our approach to cover a wide range of topics, providing readers with reliable and practical advice to enhance their knowledge and skills. That's why millions of readers turn to us each year. Join us in celebrating the joy of learning, guided by standards you can trust.

What Is Policy-Based Network Management?

By Alex Newth
Updated: May 17, 2024
Views: 5,967
Share

Policy-based network management enables administrators to control a network by imputing into the network policies — such as business policies — that users have to follow. While this can be set for each individual user, policy-based network management more often sets certain policies for a group of users to simplify the process. The main advantage to this is that there is consistency among user behavior, ensuring that no one is doing something against the business’s rules. If the administrators are unfamiliar with this system, then it may be difficult to use, because the programming often is advanced.

Many businesses run on policies, and policy-based network management is a similar approach. Unlike business policies that control how people interact or do business, these policies are more about how the user’s computer interacts with the network. These policies will bar a user from performing activities that go against policies, or the user may not even have access to certain areas. The policies usually stipulate that the user cannot access an area with sensitive files, or the user may not be able to save or copy files.

For small networks, administrators may set user permissions for each user individually, but this tends to be uncommon. More commonly, policy-based network management implements user groups and each group has a specific set of policies. These groups can be for workers, managers and administrators or they can be any other arbitrary title. While individual policies are rare, administrators still can add specific policies for a user even after he is placed in a group. This may be done for a new user or, perhaps, a user who has received disciplinary action and lost some network privileges.

When policy-based network management is used, consistency generally is achieved to a much higher degree than with other network management procedures. This is because very strict rules are placed on the user, disabling any inconsistent computing behavior. Aside from hacking the network or having policies changed by administrators, there are very fey ways of getting around the policies, making this management method rather effective.

While policy-based network management normally is effective, the human element may cause security to slip. It normally is very easy for administrators to add users to groups or to change users’ permissions. This becomes difficult when administrators have to write entirely new policies, because the coding for this typically is advanced. This means administrators should be thoroughly aware of how to make policies before this system is used.

Share
WiseGeek is dedicated to providing accurate and trustworthy information. We carefully select reputable sources and employ a rigorous fact-checking process to maintain the highest standards. To learn more about our commitment to accuracy, read our editorial process.

Editors' Picks

Discussion Comments
Share
https://www.wisegeek.net/what-is-policy-based-network-management.htm
Copy this link
WiseGeek, in your inbox

Our latest articles, guides, and more, delivered daily.

WiseGeek, in your inbox

Our latest articles, guides, and more, delivered daily.