Device Posture Check

Secure your network perimeter effectively with Device Posture Check, which assesses device security based on customizable policy restrictions in real-time.

This feature is available in the Premium plan and higher.

The Device Posture Check is a sophisticated security measure integrated into our Client Application, designed to assess the security posture of devices seeking access to the network perimeter in real-time. It employs a comprehensive set of policy restrictions that can be customized to align with organizational security requirements.

How it works

  1. Device Assessment: When a user starts a Client Application, or when a device attempts to connect to the perimeter, the Device Posture Check feature conducts a comprehensive assessment of the device's security posture based on the specified policy restrictions.

  2. Policy Evaluation: The feature evaluates the device's compliance with each policy restriction, determining whether it meets the required security standards.

  3. Access Control: Based on the results of the posture check, the device is either granted or denied access to the perimeter.

  4. Real-time Policy Enforcement: The Device Posture Check feature is continuously monitoring for changes in policy restrictions. If new policies are applied or if existing ones are modified, devices that no longer meet the updated criteria are promptly disconnected from the perimeter.

  5. Centralized Monitoring: Administrators have overview of all devices from Control Panel, with detailed insights into the posture checks perfomed on each device, including historical data.

Available policy restrictions

Configuration guide

A default security policy, recommended by GoodAccess, is automatically enabled. This policy is designed to only log device posture checks and does not prevent access to the perimeter. It cannot be deleted but can be disabled using the provided switch button.

Log in to the GoodAccess Control Panel, and go to Access Control > Device Posture Check.

Click + Add Policy.

Step 1 - General Settings

  • Name - Give the policy a name

  • Description - Optionally write a description

  • On failure - Specify the action to take if a device fails the posture check:

    • Make a log entry

    • Deny access & make a log entry

Click Continue.

Step 2 - OS Restrictions

Choose the operating system(s) included in this restriction. For each selected OS, specify the policy restrictions.

Click Continue.

Step 3 - Members & Groups

Click + Add to specify individual Members or Groups to apply these restrictions to, or select the option to apply them to all Members of your Team automatically.

Click Continue.

Step 4 - Summary

Make sure to thoroughly review all configured Device Posture Check policy settings and make any necessary adjustments to prevent unintended limitation of access to the perimeter.

Click Submit.

You have now successfully set up your Device Posture Check policy.

Not sure about the configuration?

Get in touch with our Solution Architect who can help you understand how to effectively secure your organization with the Device Posture Check and help you configure it. This service is completely free.

Last updated