How the Symantec Network Access Control Enforcer appliances work with Host Integrity policies
|Article:HOWTO81758|||||Created: 2012-10-25|||||Updated: 2012-10-25|||||Article URL http://www.symantec.com/docs/HOWTO81758|
The security policies that all Enforcer appliances direct Symantec Network Access Control or Symantec Endpoint Protection clients to run on client computers are called Host Integrity policies. You create and manage Host Integrity policies on the console of a Symantec Endpoint Protection Manager.
Host Integrity policies specify the software that is required to run on a client. For example, you can specify that the following security software that is located on a client computer must comply with certain requirements:
When a client tries to connect to the network, it runs a Host Integrity check. It then sends the results to an Enforcer appliance. You can configure clients to run Host Integrity checks at various times.
Typically, the Enforcer appliance is set up to verify that the client passes the Host Integrity check before it grants network access to the client. If the client passes the Host Integrity check, it is in compliance with the Host Integrity policy at your company. However, each type of Enforcer appliance defines the network access criteria differently.
Article URL http://www.symantec.com/docs/HOWTO81758