Network Access Protection: New Ways To Keep Your Network Healthy
Số trang: 9
Loại file: pdf
Dung lượng: 134.31 KB
Lượt xem: 5
Lượt tải: 0
Xem trước 2 trang đầu tiên của tài liệu này:
Thông tin tài liệu:
Longhorn, Windows Vista, and WindowsXP-sp2 that allow a computer administrator to develop and enforce compliance with health policies for network access and communication. NAP provides administrator-defined requirements for system health policy enforcement that help ensure computers connecting to a network or communicates on a network meet these policy requirements. NAP also provides an Application Programming Interface (API) to help administrators, developers and vendors enforce compliance with health policies for networkaccess and communication....
Nội dung trích xuất từ tài liệu:
Network Access Protection: New Ways To Keep Your Network HealthyExpert Reference Series of White Papers Network Access Protection: New Ways To KeepYour Network Healthy1-800-COURSES www.globalknowledge.comNetwork Access Protection: New WaysTo Keep Your Network HealthyMark Mizrahi, Global Knowledge Instructor, MCSE, MCTWhat It IsNetwork Access Protection (NAP) is a security-policy enforcement technology built into Windows ServerLonghorn, Windows Vista, and WindowsXP-sp2 that allow a computer administrator to develop and enforcecompliance with health policies for network access and communication. NAP provides administrator-definedrequirements for system health policy enforcement that help ensure computers connecting to a network orcommunicates on a network meet these policy requirements. NAP also provides an Application ProgrammingInterface (API) to help administrators, developers and vendors enforce compliance with health policies for net-work access and communication.Network Access Protections is also known as a network quarantine platform from Microsoft that isolates acomputer that might be a danger to your network until they are patched or until it gets updated with antivirussoftware, the firewall is enabled, or it complies with whatever measures your company’s security policies dic-tate. NAP supports IPsec, DHCP, VPN 802.1X, and a Terminal Server quarantine enforcement client.One of the most time-consuming, resource-intensive duties a network administrator faces is ensuring thatcomputers are kept up-to-date with health policy requirements, also known as computer health, before theyaccess their private networks or communicate with network resources. Some of the challenges are the travel-ing laptops, home computers, and even the internal desktop machines, all of which might not meet the healthpolicies that a private network is trying to maintain. NAP provides a mechanism to ensure ongoing complianceas the security policies change.Health policies requirements are put in place to protect the private network’s overall integrity from clients,who might have out-of-date or no virus protection, malicious programming code installed, out-of-date soft-ware updates, improper vendor specific and custom programs, and miss configured configurations, connect toresources. These health policies are required to maintain the integrity and security of the private network andcan be easily managed and changed at any time.How It WorksWhen a user attempts to connect to the network, either remotely or internally, the computer sends aStatement of Health (SoH) to the NAP server, a Longhorn Server system configured as a Network Policy Server(NPS). The NPS communicates with policy servers, such as antivirus and patch-management servers, to deter-mine whether the PC meets the predetermined health policy. NAP can be used simply as a tracking tool tomonitor all computers and grant them access to the network even if they don’t comply with health policies.The computers compliance state is logged for review at any time.Copyright ©2007 Global Knowledge Training LLC. All rights reserved. Page 2For more restrictive access to the network, NAP can be set up to restrict or limit access to the private network,while permitting access to a restricted area of the network, and automatically update computers with softwareupdates to meet health policy requirements. If a computer has all the software and configurations that thehealth policy requires, the computer is considered compliant and will be allowed in to access the network.Noncompliant computers are quarantined and can be redirected to a remediation server to receive the properupdates and configurations that will make the machine compliant with the health policy. Then, private networkaccess will be granted.Four Features of Network Access Protection1. Health Policy ValidationWhen a user attempts to connect to a network, the computer’s SoH is validated against the health policies ofthe private network. The NPS communicates with a System Health Verifier (SHV) such as an anti-virus server ora path-management server to check the SoH of client machines running NAP client software. The clientmachine accessing the network is known as a System Health Agent (SHA). Based on the SoH by the SHA, theSHV verifies health compliance and can redirect the client to the proper remediation server to obtain the prop-er items necessary to become compliant.2. IsolationNAP can be configured to limit, redirect, or restrict traffic of noncompliant computers. Restrictions can be setfor a specific amount of time, redirecting to a quarantined part of the private network or restrictions to specificresources. Exceptions might be placed on specific health policy requirements by allowing customized limitedaccess.3. RemediationNoncompliant computers can be aut ...
Nội dung trích xuất từ tài liệu:
Network Access Protection: New Ways To Keep Your Network HealthyExpert Reference Series of White Papers Network Access Protection: New Ways To KeepYour Network Healthy1-800-COURSES www.globalknowledge.comNetwork Access Protection: New WaysTo Keep Your Network HealthyMark Mizrahi, Global Knowledge Instructor, MCSE, MCTWhat It IsNetwork Access Protection (NAP) is a security-policy enforcement technology built into Windows ServerLonghorn, Windows Vista, and WindowsXP-sp2 that allow a computer administrator to develop and enforcecompliance with health policies for network access and communication. NAP provides administrator-definedrequirements for system health policy enforcement that help ensure computers connecting to a network orcommunicates on a network meet these policy requirements. NAP also provides an Application ProgrammingInterface (API) to help administrators, developers and vendors enforce compliance with health policies for net-work access and communication.Network Access Protections is also known as a network quarantine platform from Microsoft that isolates acomputer that might be a danger to your network until they are patched or until it gets updated with antivirussoftware, the firewall is enabled, or it complies with whatever measures your company’s security policies dic-tate. NAP supports IPsec, DHCP, VPN 802.1X, and a Terminal Server quarantine enforcement client.One of the most time-consuming, resource-intensive duties a network administrator faces is ensuring thatcomputers are kept up-to-date with health policy requirements, also known as computer health, before theyaccess their private networks or communicate with network resources. Some of the challenges are the travel-ing laptops, home computers, and even the internal desktop machines, all of which might not meet the healthpolicies that a private network is trying to maintain. NAP provides a mechanism to ensure ongoing complianceas the security policies change.Health policies requirements are put in place to protect the private network’s overall integrity from clients,who might have out-of-date or no virus protection, malicious programming code installed, out-of-date soft-ware updates, improper vendor specific and custom programs, and miss configured configurations, connect toresources. These health policies are required to maintain the integrity and security of the private network andcan be easily managed and changed at any time.How It WorksWhen a user attempts to connect to the network, either remotely or internally, the computer sends aStatement of Health (SoH) to the NAP server, a Longhorn Server system configured as a Network Policy Server(NPS). The NPS communicates with policy servers, such as antivirus and patch-management servers, to deter-mine whether the PC meets the predetermined health policy. NAP can be used simply as a tracking tool tomonitor all computers and grant them access to the network even if they don’t comply with health policies.The computers compliance state is logged for review at any time.Copyright ©2007 Global Knowledge Training LLC. All rights reserved. Page 2For more restrictive access to the network, NAP can be set up to restrict or limit access to the private network,while permitting access to a restricted area of the network, and automatically update computers with softwareupdates to meet health policy requirements. If a computer has all the software and configurations that thehealth policy requires, the computer is considered compliant and will be allowed in to access the network.Noncompliant computers are quarantined and can be redirected to a remediation server to receive the properupdates and configurations that will make the machine compliant with the health policy. Then, private networkaccess will be granted.Four Features of Network Access Protection1. Health Policy ValidationWhen a user attempts to connect to a network, the computer’s SoH is validated against the health policies ofthe private network. The NPS communicates with a System Health Verifier (SHV) such as an anti-virus server ora path-management server to check the SoH of client machines running NAP client software. The clientmachine accessing the network is known as a System Health Agent (SHA). Based on the SoH by the SHA, theSHV verifies health compliance and can redirect the client to the proper remediation server to obtain the prop-er items necessary to become compliant.2. IsolationNAP can be configured to limit, redirect, or restrict traffic of noncompliant computers. Restrictions can be setfor a specific amount of time, redirecting to a quarantined part of the private network or restrictions to specificresources. Exceptions might be placed on specific health policy requirements by allowing customized limitedaccess.3. RemediationNoncompliant computers can be aut ...
Tìm kiếm theo từ khóa liên quan:
công nghệ thông tin tin học internet microsoft office computer networkTài liệu liên quan:
-
52 trang 432 1 0
-
Top 10 mẹo 'đơn giản nhưng hữu ích' trong nhiếp ảnh
11 trang 319 0 0 -
74 trang 303 0 0
-
96 trang 297 0 0
-
Báo cáo thực tập thực tế: Nghiên cứu và xây dựng website bằng Wordpress
24 trang 291 0 0 -
Đồ án tốt nghiệp: Xây dựng ứng dụng di động android quản lý khách hàng cắt tóc
81 trang 284 0 0 -
EBay - Internet và câu chuyện thần kỳ: Phần 1
143 trang 277 0 0 -
Tài liệu dạy học môn Tin học trong chương trình đào tạo trình độ cao đẳng
348 trang 269 1 0 -
Tài liệu hướng dẫn sử dụng thư điện tử tài nguyên và môi trường
72 trang 268 0 0 -
64 trang 265 0 0