
Customer Needs Assessment
Vulnerability to Attacks
■Intrusion detection system (IDS)/intrusion prevention system
■ProCurve Network Immunity
You should assess your network’s level of protection and look for weak points. The router connecting to the Internet probably has a firewall, but do endpoints also have firewalls and
Another step you can take is to ensure that operating systems (OSs) and applications are patched. Many viruses and worms are designed to exploit a security vulnerability in an OS or application. When such a security vulnera- bility is discovered, the vendor creates a patch to eliminate it. By patching known vulnerabilities, you can help protect your network against the attacks that exploit them.
However, you may not always have time to manually patch endpoints before an attack occurs. In addition, some laptops may not be attached to the network the day you apply a patch. And if you have guests attaching to your network, you do not know the state of their endpoints when they attach to the network.
After a careful assessment of your network’s weak points, you can plan your network access solution to shore up weak points. For example, your endpoint integrity policy could deny network access to endpoints without