Use the information and procedures in this section to enforce compliance, policies, and security. What to read next Managing WatchlistsWatchlists provide custom detection and continuous monitoring of your environment for potential threats and suspicious activity. Managing PoliciesA policy determines preventative behavior and establishes sensor settings. Each asset is assigned a policy. Manage ReputationsA reputation is the level of trust or distrust that is given to an application. Reputations are based on multiple sources of known good and known bad reputations. Malware RemovalYou can use the reputation of an application to identify malware. Cloud AnalysisImprove prevention against new forms of malware by enabling analysis of unknown binaries by Symantec CYNIC. RecommendationsA recommendation is a suggested configuration, a reputation override, which you select to apply to improve the healthy state of your environment. Currently, you can use the Hash and IT Tools recommendations.