Secure Virtual Assist Overview - Dell SMA 200 Administration Manual

Table of Contents

Advertisement

How Does End Point Control Work?
Configuring End Point Control
What is End Point Control?
In traditional VPN solutions, accessing your network from an untrusted site like an employee-owned computer
or a kiosk at an airport or hotel increases the risk to your network resources. EPC provides secure access from
any Web-enabled system, including devices in untrusted environments.
Benefits of End Point Control
The SMA/SRA appliance supports End Point Control (EPC) that provides the following benefits:
Verifies that the user's environment is secure before establishing a connection.
Protects sensitive data and
Ensures that your network is not compromised when accessed from devices in untrusted environments.
Protects the network from threats originating from client devices participating in the SMA/SRA.
How Does End Point Control Work?
The SMA/SRA appliance provides end point security controls by completing host integrity checking and security
protection mechanisms before a tunnel session is begun. Host integrity checks help ensure that the client
system is in compliance with your organization's security policy. SonicWALL end point security controls are
tightly integrated with access control to analyze the Windows client system and apply access controls based on
the results.
End Point Control is supported on Mac iOS and Android mobile devices using Mobile Connect, allowing device
profiles to be created for these devices. This provides security protection from threats against client devices
and protection to the SMA/SRA appliance from threats originating from client devices logged in to the
appliance. For more information on Mobile Connect, refer to the Mobile Connect User Guides.
Configuring End Point Control
To configure End Point Control (EPC), complete the following tasks:
1
Configure Device Profiles that allow or deny user authentication based on various global, group, or user
attributes. See
End Point Control > Device Profiles
2
Add and configure groups and users to allow or deny End Point Control profiles. See
page 417.
3
Configure users to inherit their group profiles. See
4
Enable End Point Control. See
5
Connect to NetExtender and monitor the End Point Control log. See

Secure Virtual Assist Overview

This section provides an introduction to the Secure Virtual Assist feature. This section contains the following
topics:
What is Secure Virtual Assist?
Benefits of Secure Virtual Assist
How Does Secure Virtual Assist Work?
on page
49
on page
49
on page 250.
Edit EPC Settings
End Point Control > Status
on page
50
on page
50
on page
50
on page 417.
on page 256.
End Point Control > Log
Dell SonicWALL Secure Mobile Access 8.5
Administration Guide
Edit EPC Settings
on
on page 258.
49

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sma 400Sra 1600Sra 4600Sma 500v

Table of Contents