9.4. Get Scanned in Mid-Stream
Whatever your NAC implementation, consider using time-based scans or event-driven monitoring that your vendor might offer:
Time-based scans: Run periodically on the endpoint device, generally at administrator-specified intervals
Event-driven monitoring: Reports back to the NAC server as soon as it determines that a machine has come out of compliance
|
Regardless of the mechanism, post-authentication scanning ensures that these machines stay in compliance throughout the session and that users don't game the system — for example, by turning off their personal firewalls as soon as they gain access to the network.
Get Network Access Control For Dummies® now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.