LogoLogo
GoodAccess WebsiteRequest Free TrialDownload App
  • Getting Started
    • 1. What is GoodAccess?
    • 2. Architecture Overview
    • 3. Sign up for Free Trial
    • 4. Download App & Connect
  • 🖥️Configuration guides
    • Features
      • Zero Trust Access Control
        • Access Cards
        • Device Posture Check
        • Device Approval
        • Geo Restrictions
      • API Integration
        • API Reference
          • Members
          • Groups
          • Systems
          • Access Cards
          • Relations
          • Gateways
          • Logs
        • Acronis Integration
      • SIEM Integration
      • SSO/SCIM
        • Auth0
        • Cisco Duo
        • Google Workspace
        • JumpCloud
        • Microsoft Entra ID
        • Okta
        • OneLogin
        • Ping Identity
        • Universal (SAML)
      • MFA
      • Passkeys
      • MSI deployment
      • Threat Blocker
      • Custom Domain Blocking
      • DNS Management
      • Split Tunneling
      • Port Forwarding
    • Branch Connector
      • Cisco
      • Cisco Meraki
      • FortiGate
      • MikroTik
      • SonicWall
      • UniFi USG
      • Zyxel Nebula Control Center
      • Other supported routers and firewalls
    • Cloud Connector
      • AWS
      • Google Cloud
      • Microsoft Azure
      • Other Public Cloud providers
    • IP whitelisting
      • APACHE Web Server
      • AWS VPC
      • Azure (Office 365)
      • Google Cloud
      • Google Workspace
      • Magento
      • Microsoft IIS
      • NGINX
        • Domain
        • Subdomain
        • URL
      • OpenCart
      • PHP
      • PHPMyAdmin
      • Pipedrive
      • SalesForce
      • SSH server
      • WordPress
      • Zoho CRM
    • Linux
      • DEB repository
      • RPM repository
      • Manual installation
      • Linux Troubleshooting
  • 🆘FAQ & Troubleshooting
    • FAQ
      • Business
      • Technical
    • Troubleshooting
  • 📓Product Changelog
    • Windows
    • macOS
Powered by GitBook
On this page
  • How it works
  • Available policy restrictions
  • Real-World Use Cases
  • Configuration guide
  • Step 1 - General Settings
  • Step 2 - OS Restrictions
  • Step 3 - Members & Groups
  • Step 4 - Summary
  • Not sure about the configuration?

Was this helpful?

  1. Configuration guides
  2. Features
  3. Zero Trust Access Control

Device Posture Check

Secure your network perimeter effectively with Device Posture Check, which assesses device security based on customizable policy restrictions in real-time.

This feature is available in the Premium plan and higher.

The Device Posture Check is a sophisticated security measure integrated into our Client Application, designed to assess the security posture of devices seeking access to the network perimeter in real-time. It employs a comprehensive set of policy restrictions that can be customized to align with organizational security requirements.

How it works

  1. Device Assessment: When a user starts a Client Application, or when a device attempts to connect to the perimeter, the Device Posture Check feature conducts a comprehensive assessment of the device's security posture based on the specified policy restrictions. This assessment is then automatically repeated every 5 minutes, ensuring continuous compliance with your security policies.

  2. Policy Evaluation: The feature evaluates the device's compliance with each policy restriction, determining whether it meets the required security standards.

  3. Access Control: Based on the results of the posture check, the device is either granted or denied access to the perimeter.

  4. Real-time Policy Enforcement: The Device Posture Check feature is continuously monitoring for changes in policy restrictions. If new policies are applied or if existing ones are modified, devices that no longer meet the updated criteria are promptly disconnected from the perimeter.

  5. Centralized Monitoring: Administrators have overview of all devices from Control Panel, with detailed insights into the posture checks perfomed on each device, including historical data.

Available policy restrictions

  • Kernel Version

  • OS Version /

Real-World Use Cases

Below are practical examples that show how Device Posture Check can enhance security and ensure compliance in various scenarios.

1. Ensuring Compliance for Corporate & BYOD Devices

Whether your organization relies on corporate devices, allows Bring Your Own Device (BYOD), or both, the Device Posture Check continuously assesses every device attempting to access your network perimeter.

Key Benefits:

  • Reduced Risk: Only compliant devices are allowed to access your network perimeter, minimizing potential vulnerabilities.

  • Cost Efficiency: By securely enabling BYOD, your organization can reduce hardware costs while maintaining strict security standards.

  • Seamless Integration: Both corporate and personal devices are managed under a unified security framework, simplifying overall administration.

2. Regulatory Compliance and Audit Readiness

When your organization must adhere to industry regulations (e.g., GDPR, HIPAA, PCI-DSS, SOC2, NIS2), Device Posture Check supports your compliance efforts by continuously enforcing and logging security policies, helping you meet stringent regulatory requirements.

Key Benefits:

  • Regulatory Adherence: Ensures all devices meet industry-specific security standards.

  • Audit Readiness: Comprehensive logs facilitate the process of compliance reporting and audits.

  • Reduced Risk of Non-Compliance: Only compliant devices are granted access, lowering the risk of regulatory breaches.

3. Securing Third-Party and Guest Access

When your organization collaborates with external partners or hosts guest users, Device Posture Check ensures that every connecting device—from vendors to auditors—meets your security standards before accessing your network.

Key Benefits:

  • Controlled External Access: Only devices that pass the security check can connect, reducing exposure to external threats.

  • Enhanced Auditability: Detailed logs provide a clear record of compliance for external devices.

  • Minimized Risk: Protects your network by ensuring that external access is strictly regulated.

4. Securing Access to Sensitive Data

When access to sensitive data or intellectual property is at stake, Device Posture Check ensures that only devices with robust security postures can connect to critical systems.

Key Benefits:

  • Enhanced Data Protection: Only devices meeting stringent security criteria can access sensitive resources.

  • Risk Mitigation: Reduces the potential for data breaches by blocking non-compliant devices.

  • Granular Control: Allows for customized security requirements tailored to high-risk data environments.

5. Adaptive Security in Dynamic Environments

As your organization's security policies evolve, the Device Posture Check continuously evaluates connected devices and enforces updated criteria in real time. This adaptive approach is essential in a dynamic threat landscape.

Key Benefits:

  • Continuous Security: Automatically adapts to policy changes, ensuring ongoing compliance.

  • Instant Enforcement: Non-compliant devices are immediately disconnected upon policy updates.

  • Operational Flexibility: Supports rapid updates to security policies without manual intervention.

Configuration guide

A default security policy, recommended by GoodAccess, is automatically enabled. This policy is designed to only log device posture checks and does not prevent access to the perimeter. It cannot be deleted but can be disabled using the provided switch button.

Click + Add Policy.

Step 1 - General Settings

  • Name - Give the policy a name

  • Description - Optionally write a description

  • On failure action - Choose the action to take if a device fails the posture check:

    • Make a log entry

    • Deny access & make a log entry

  • On failure message - Choose the message to display if a device fails the posture check:

    • Default message

    • Custom message

  • Enable email notification - Optionally notify the Team Owner or all Admins via email if a device fails the posture check.

Click Continue.

Step 2 - OS Restrictions

Click Continue.

Step 3 - Members & Groups

Click + Add to assign individual Members or Groups to apply these restrictions to, or select the option to apply them to all Members of your Team automatically.

Click Continue.

Step 4 - Summary

Make sure to thoroughly review all configured Device Posture Check policy settings and make any necessary adjustments to prevent unintended limitation of access to the perimeter.

Click Submit.

You have now successfully set up your Device Posture Check policy.

Not sure about the configuration?

PreviousAccess CardsNextDevice Approval

Last updated 2 months ago

Was this helpful?

Choose the operating system(s) included in this restriction. For each selected OS, specify the .

Get in touch with our who can help you understand how to effectively secure your organization with the Device Posture Check and help you configure it. This service is completely free.

🖥️
Log in to the GoodAccess Control Panel, and go to Access Control > Device Posture Check.
Solution Architect
policy restrictions
Device Posture Check section of the GoodAccess Control Panel
General Settings
OS Restrictions
Members & Groups
Summary
Device Posture Check section of the GoodAccess Control Panel.
Step 1 of the Device Posture Check setup wizard.
Step 2 of the Device Posture Check setup wizard.
Step 3 of the Device Posture Check setup wizard.
Step 4 of the Device Posture Check setup wizard.