preview

Network Policy Server and Remote Access

Good Essays

The nature of our business requires us to have a flexible sales force. Because of that detail we need to be receptive to the needs of our mobile workforce. The most critical tool involved in their success is the ability to reliably connect and access our company networks. These connections can be from employees using company issued laptops or personal computers used from home or on the road.
For the most part we have addresses the needs of our sales force on a case by case basis but going forward we really need to ensure we have a defined policy to streamline remote access. To accomplish this there are a few benchmarks we need to achieve. First of all the network has to be reliable or in more technical terms it needs to have high …show more content…

SHV’s use that information contained by the SHA’s to define what health requirements are needed in order to be compliant and gain access to the network. Working together the SHA and SHV agents monitor and validate the health of incoming network transmissions.
Statement of Health, System Statement of Health, and System Statement of Health Response
The Statement of Health or SoH is generated by each SHA and is communicated to the NAP to determine compliance. Every time there is an update of change with a SHA possibly through remediation the update is then also applied to the SoH. The NAP service will combine all of the various SoH’s that a client generated during a remote connection and combine them into the System Statement of Health or SSoH which essentially defines the system health characteristics of the client computer. Lastly the System Statement of Health Response is generated by the NAP after compiling all of the remote user’s system health characteristics. This information or SSoHR is sent to the enforcement point for access validation.
NAP Enforcement
The NAP system health characteristics give the server all of the essential health information to grant or deny access but we need a function to physically make that access decision. NAP uses enforcement point to carry out that function. There are a few different methods of NAP enforcement all of which have

Get Access