Device Posture Check
Secure your network perimeter effectively with Device Posture Check, which assesses device security based on customizable policy restrictions in real-time.
This feature is available in the Premium plan and higher.
The Device Posture Check is a sophisticated security measure integrated into our Client Application, designed to assess the security posture of devices seeking access to the network perimeter in real-time. It employs a comprehensive set of policy restrictions that can be customized to align with organizational security requirements.
How it works
Device Assessment: When a user starts a Client Application, or when a device attempts to connect to the perimeter, the Device Posture Check feature conducts a comprehensive assessment of the device's security posture based on the specified policy restrictions.
Policy Evaluation: The feature evaluates the device's compliance with each policy restriction, determining whether it meets the required security standards.
Access Control: Based on the results of the posture check, the device is either granted or denied access to the perimeter.
Real-time Policy Enforcement: The Device Posture Check feature is continuously monitoring for changes in policy restrictions. If new policies are applied or if existing ones are modified, devices that no longer meet the updated criteria are promptly disconnected from the perimeter.
Centralized Monitoring: Administrators have overview of all devices from Control Panel, with detailed insights into the posture checks perfomed on each device, including historical data.
Available policy restrictions
Configuration guide
A default security policy, recommended by GoodAccess, is automatically enabled. This policy is designed to only log device posture checks and does not prevent access to the perimeter. It cannot be deleted but can be disabled using the provided switch button.
Log in to the GoodAccess Control Panel, and go to Access Control > Device Posture Check.
Click + Add Policy.
Step 1 - General Settings
Name - Give the policy a name
Description - Optionally write a description
On failure - Specify the action to take if a device fails the posture check:
Make a log entry
Deny access & make a log entry
Click Continue.
Step 2 - OS Restrictions
Choose the operating system(s) included in this restriction. For each selected OS, specify the policy restrictions.
Click Continue.
Step 3 - Members & Groups
Click + Add to specify individual Members or Groups to apply these restrictions to, or select the option to apply them to all Members of your Team automatically.
Click Continue.
Step 4 - Summary
Make sure to thoroughly review all configured Device Posture Check policy settings and make any necessary adjustments to prevent unintended limitation of access to the perimeter.
Click Submit.
You have now successfully set up your Device Posture Check policy.
Not sure about the configuration?
Get in touch with our Solution Architect who can help you understand how to effectively secure your organization with the Device Posture Check and help you configure it. This service is completely free.
Last updated