Controlling Network AccessΒΆ

Note

This feature required Professional or Enterprise Edition

Based on the information collected through the network sensor and the agent, a policy can be established to restrict network use by the non-compliant device. Enforcement policies can be applied in a variety of ways.