Designing Access Controls

Choose Endpoint Integrity Testing Methods

Sophisticated users, on the other hand, are so comfortable changing settings that you may have to take measures to prevent them from trying to avoid the testing process. With the ActiveX testing method, for example, users could close their Web browser to bypass the post-connect testing.

Table 3-48. Testing Method by User Sophistication

 

Agentless

ActiveX

NAC EI Agent

User sophistication

• Low (domain members)

Low to medium

Low to medium

 

• Medium (non-domain

 

 

 

members)

 

 

User interaction

May need to enable print and

Support for ActiveX and

Download and install agent

 

file sharing

JavaScript on the Web

one time

 

May need to supply network

browser

 

 

administrator with admin

Keep Internet Explorer open

 

 

credentials

 

 

User evasion

None

Change settings before pre-

None

 

 

connect testing, then change

 

 

 

them back after pre-connect

 

 

 

testing is completed

 

 

 

Close browser to avoid post-

 

 

 

connect testing

 

 

 

 

 

Example. The PCU students are computer literate. In fact, many are expert users. Although some of the university administrators and faculty are less knowledgeable about computers, all of them are using computer programs to do their jobs and are comfortable completing basic tasks. Based solely on user sophistication, the PCU network administrators decide to set up support for the testing methods outlined in Table 3-49.

Table 3-49. Testing Methods for User Sophistication

Factor

Public Wired

Private Wired

Public Wireless

Private

Remote

 

 

 

 

Wireless

 

 

 

 

 

 

 

User sophistication

NAC EI agent

NAC EI agent

NAC EI agent

NAC EI agent

NAC EI agent

 

ActiveX

Agentless

ActiveX

Agentless

Agentless

 

 

ActiveX

 

ActiveX

ActiveX

 

 

 

 

 

 

3-73