A conditional activation system distributes a security policy to the
computer systems of an enterprise. Upon receiving a security policy at a
computer system, the computer system may install the received security
policy without activation. When a security policy is installed without
activation, it is loaded onto a computer system but is not used to
process security enforcement events. The computer system may then
determine whether a security policy activation criterion has been
satisfied and, if so, activate the security policy.