As you have seen above, the built-in policies that ship with UAG are simple, but which one should you use? Well, there's no definite catch-all answer, of course, but here are some things that you should take under consideration:
Whatever policy you choose, remember that it only controls the endpoint computer. An endpoint policy can enhance security, but it's not a replacement for proper user and access control.
If your users typically use their home computers, remember that they may run whatever they want on them, including things that may be harmful, such as a file-sharing application or a comprehensive collection of worms and spyware.
Despite the above, beware of choosing or creating policies that will torture your users. An organization may have preference to certain endpoint security products, but requiring everyone to use a specific product may be considered to be crossing the line. This may also have legal implications...