3.3. Putting the Pieces Together

During the assessment phase (discussed in the preceding sections), you collect a lot of information about the user, his or her machine, and the environmental factors associated with the access request. The next step in the NAC lifecycle, indicated by the shaded area in Figure 3-3, is evaluation. In this phase, your NAC system puts together all the pieces of information collected during the assessment phase.

Figure 3.3. The evaluation phase.

Most NAC deployments have different sets of policies related to different groups of users. In the evaluation phase, the NAC system examines the tens, hundreds, or thousands of new session requests coming onto the network and determines exactly which policy should apply to which request.

For example, your NAC system performs user authentication, but at the same time, it pulls from your corporate directory any additional required information related to that user. Your corporate directory might include group membership information, which indicates what groups the user is a member of in the organization, allowing NAC to automatically differentiate employees from contractors or members of the Finance department from members of the Engineering department.

NAC uses this information to determine which, of potentially many, policies apply to a particular authentication request. It then evaluates the next steps required to provide the appropriate level of access. For example, an employee on a managed laptop might have his or her machine automatically remediated if it doesn't have an up-to-date antivirus program, whereas a contractor who uses his or her own machine might end up in quarantine because your organization's IT department can't patch that machine.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.17.186.247