Dell SonicWALL Secure Mobile Access 8.5
Administration Guide
49
• How Does End Point Control Work? on page 49
• Configuring End Point Control on page 49
What is End Point Control?
In traditional VPN solutions, accessing your network from an untrusted site like an employee-owned computer
or a kiosk at an airport or hotel increases the risk to your network resources. EPC provides secure access from
any Web-enabled system, including devices in untrusted environments.
Benefits of End Point Control
The SMA/SRA appliance supports End Point Control (EPC) that provides the following benefits:
• Verifies that the user’s environment is secure before establishing a connection.
• Protects sensitive data and
• Ensures that your network is not compromised when accessed from devices in untrusted environments.
• Protects the network from threats originating from client devices participating in the SMA/SRA.
How Does End Point Control Work?
The SMA/SRA appliance provides end point security controls by completing host integrity checking and security
protection mechanisms before a tunnel session is begun. Host integrity checks help ensure that the client
system is in compliance with your organization’s security policy. SonicWALL end point security controls are
tightly integrated with access control to analyze the Windows client system and apply access controls based on
the results.
End Point Control is supported on Mac iOS and Android mobile devices using Mobile Connect, allowing device
profiles to be created for these devices. This provides security protection from threats against client devices
and protection to the SMA/SRA appliance from threats originating from client devices logged in to the
appliance. For more information on Mobile Connect, refer to the Mobile Connect User Guides.
Configuring End Point Control
To configure End Point Control (EPC), complete the following tasks:
1 Configure Device Profiles that allow or deny user authentication based on various global, group, or user
attributes. See End Point Control > Device Profiles on page 250.
2 Add and configure groups and users to allow or deny End Point Control profiles. See Edit EPC Settings on
page 417.
3 Configure users to inherit their group profiles. See Edit EPC Settings on page 417.
4 Enable End Point Control. See End Point Control > Status on page 256.
5 Connect to NetExtender and monitor the End Point Control log. See End Point Control > Log on page 258.
Secure Virtual Assist Overview
This section provides an introduction to the Secure Virtual Assist feature. This section contains the following
topics:
• What is Secure Virtual Assist? on page 50
• Benefits of Secure Virtual Assist on page 50
• How Does Secure Virtual Assist Work? on page 50