This image is a screen capture that shows the Identify Policy page. The Name field is completed with Critical Operating Systems. The Description field is completed. The Subtype and Target Type are both defined as Operating Systems.