Getting started To configure Rogue System Detection, you enable and set options on the Server Settings page, create policies, and install Rogue System Sensors on systems in the managed subnets. About policiesA policy is a collection of settings that you create and configure, then enforce. Considerations for policy settingsPolicy settings configure the features and performance of the Rogue System Sensor. Rogue System Detection policy settingsRogue System Detection policy settings allow you to configure and manage the instances of the Rogue System Sensor installed throughout your network. Settings can be applied to individual systems, groups of systems, and IP address ranges. Configure Rogue System Detection server and policy settingsConfirm the default configuration of the Rogue System Detection server settings. These server settings determine what a rogue system is, configure sensor settings, and more. Configuring server settings for Rogue System DetectionThese server settings allow you to customize Rogue System Detection to meet the specific needs of your organization. Rogue System Detection permission setsPermission sets for Rogue System Detection determine what information a user group can view, modify, or create for Rogue System Detection. Install sensors After you configure Rogue System Detection server settings, install the Rogue System Detection sensors. Where you install the sensors and how many sensors you install affects how effective Rogue System Detection is and can affect your network bandwidth. Rogue System Detection command-line optionsYou can run command-line options on 4.x sensors from the client system to solve issues or override the standard configuration.