This illustration shows the Policy Rules page the first time one enters the Policy subtab under Configuration Management.

The page shows a drop-down menu (labeled View Policies For) by which you can select Requests, Revocations, or Renewals, after which the page refreshes to show you the policies that apply to these distinct operations.

For Requests, as shown in this illustration, four policies are shown:  RSA Key Constraints, Validity Rule, Unique Certificate Constraint, and Trust Point DN Custom Rule, each on its own line.

Each line has five columns:  A Select radio button, the Policy Name, the Type of policy, Status, and Description.

All four have the status "enabled"; the first three have the Type "default;" the last has the Type "Custom."

Six buttons are also shown:
Reorder, to change the order in which the policies are shown and applied.
Add, to add a new policy.
Edit, to edit a selected policy's details, values, or predicates.
Enable, to put the policy into use for evaluating certificate requests.
Disable, to remove the policy from use for evaluating certificate requests.
Delete, to remove the policy from the database, after which it cannot be enabled.

These buttons are described in the Section entitled "Policy Actions."