What is the best practice for setting up device configurations in Security Management?

More...