Customer Needs Assessment

Evaluate the Existing Network Environment

Table 2-5. Recording Information about Workstations and Laptops

Hardware Vendor

Laptop or

Quantity

User

Operating

Applications

Location on

 

Workstation

 

 

System

 

 

Network

 

 

 

 

 

 

 

 

Hewlett-Packard

Laptops

105

Accounting

Windows XP

Microsoft Office

Building 1,

 

 

 

employees

 

 

applications

southeast

 

 

 

 

 

Email

corner

 

 

 

 

 

IM

when using

 

 

 

 

 

a wired

 

 

 

 

 

Inhouse

 

 

 

 

 

connection

 

 

 

 

 

 

accounting

 

 

 

 

 

 

 

 

 

 

 

 

 

program

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

When you have created a comprehensive list of OSs and applications, you can begin to consider how to ensure that endpoints are patched and free from viruses and other malware before they connect to the network. (For more information, see “Determine Your Endpoint Integrity Requirements” on page 2-34.)

Other Endpoints

After you document the workstations and laptops, you can begin to list the other endpoints on the network. For example, if the network supports Voice over IP (VoIP), what capabilities do the VoIP phones have? Which access methods do they support? Which users are using these VoIP phones? Where do these phones attach to the network? Do they use a wireless or wired connection?

What other endpoints attach to the network, and do they support 802.1X? For example, are users accessing the network through personal digital assistants (PDAs) or smartphones? Do your network printers support 802.1X? Printer vendors such as HP are adding 802.1X functionality to their printers in an effort to help you secure the network. You can then prevent users from temporarily unplugging a printer and plugging their laptop or even an AP into the printer’s jack.

2-30