# More about DCC

It enforces rules at the operating system level:

* Instantly
* Offline
* Without cloud dependency
* Without remote access

#### Enterprise Model

* An IT administrator defines and configures security policies directly within DCC.
* The DCC app can be protected with a password.
* Security policies can only be modified if the administrator has **physical access to the device**.
* Access to policy management requires the **DCC password**.
* There is no remote or cloud-based policy control.

#### Example Policy Controls

Within DCC, administrators can configure:

* Block unknown sources
* Block location access
* Restrict app installation
* Enforce Always-on VPN
* Disable system features
* Apply device-level restrictions

<figure><img src="/files/bg9sN4UvgzTIpBQmPsD9" alt="" width="188"><figcaption></figcaption></figure>

{% hint style="success" %}

### All Done – Welcome to Castrum OS

Your device is now successfully running Castrum OS - a private and secure operating system.

All data on your device is now protected.

You are in control.

No trackers. No compromises.
{% endhint %}


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://conectum-portal.gitbook.io/conectum-portal-documentation/dcc-and-apps-setup/more-about-dcc.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
