This figure shows the way in which some policies may overlap. For example, the policies for administrative resources, which determine who can complete such tasks as uploading or downloading files, viewing the domain and server logs, and unlocking users, may be superseded by policies on JMX resources if some of those tasks are particularly security-sensitive.