Dell SonicWALL Secure Mobile Access 8.5
Administration Guide
49
•
How Does End Point Control Work?
•
What is End Point Control?
In traditional VPN solutions, accessing your network from an untrusted site like an employee-owned computer
or a kiosk at an airport or hotel increases the risk to your network resources. EPC provides secure access from
any Web-enabled system, including devices in untrusted environments.
Benefits of End Point Control
The SMA/SRA appliance supports End Point Control (EPC) that provides the following benefits:
•
Verifies that the user’s environment is secure before establishing a connection.
•
Protects sensitive data and
•
Ensures that your network is not compromised when accessed from devices in untrusted environments.
•
Protects the network from threats originating from client devices participating in the SMA/SRA.
How Does End Point Control Work?
The SMA/SRA appliance provides end point security controls by completing host integrity checking and security
protection mechanisms before a tunnel session is begun. Host integrity checks help ensure that the client
system is in compliance with your organization’s security policy. SonicWALL end point security controls are
tightly integrated with access control to analyze the Windows client system and apply access controls based on
the results.
End Point Control is supported on Mac iOS and Android mobile devices using Mobile Connect, allowing device
profiles to be created for these devices. This provides security protection from threats against client devices
and protection to the SMA/SRA appliance from threats originating from client devices logged in to the
appliance. For more information on Mobile Connect, refer to the
Mobile Connect User Guides
.
Configuring End Point Control
To configure End Point Control (EPC), complete the following tasks:
1 Configure Device Profiles that allow or deny user authentication based on various global, group, or user
attributes. See
End Point Control > Device Profiles
2 Add and configure groups and users to allow or deny End Point Control profiles. See
.
3 Configure users to inherit their group profiles. See
.
4 Enable End Point Control. See
5 Connect to NetExtender and monitor the End Point Control log. See
Secure Virtual Assist Overview
This section provides an introduction to the Secure Virtual Assist feature. This section contains the following
topics:
•
What is Secure Virtual Assist?
•
Benefits of Secure Virtual Assist
•