quarantine control....

Posted on 2005-05-06
Last Modified: 2011-10-03
I am trying to find a way to quarantine laptops that come in to our office and plug right into our network. I would like them to have virus software and patches before they are allowed access to the network. I've been reeding the article at:

but this seems geared to people who are connecting from outside the network. The people who would be bringing in the laptops would just come in, bypass the firewall, get a DHCP address and away they go. It also might not be possible for me restrict by groups in AD because they are logging on locally to their machines but it is still possible in some situations for them to access a couple of computers on the network.

What would be the best way to make sure these people pass certain qualifications so they don't end up bringing in a virus,etc.?
Question by:wlandymore
    LVL 20

    Expert Comment

    LVL 1

    Author Comment

    so if I install IAS on a computer and then write the scripts, how can I make sure that computers who have just been plugged into the network go through the script to make sure they're up to code?
    LVL 1

    Author Comment

    Also, I saw something about the 'needing to be a member of the same domain as the IAS server'. Does this mean that if the client is logging on to the local computer it will bypass the policy?
    LVL 20

    Accepted Solution

    Here are two excellent reads on it but it looks like it is only going to apply to remote users but now i'm not sure if you can use it for users that plug into your network.

    Deploying Network Access Quarantine Control, Part 1

    Deploying Network Access Quarantine Control, Part 2

    I'm still looking for more info though.

    LVL 1

    Author Comment

    I've been playing around with it a little and if you open up IAS and then make a new policy, once you've named it, you can choose things like VPN, but there is also an Ethernet category. It seems like there might be a way but it's very vague on the subject.

    thanks for the links. I'll take a look at those now and see if I can understand how to do this....

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    How to run any project with ease

    Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
    - Combine task lists, docs, spreadsheets, and chat in one
    - View and edit from mobile/offline
    - Cut down on emails

    The HP utility "HP Lights-Out Online Configuration Utility for Windows Server 2003/2008" could be of great use when it comes to remotely configure a HP servers ILO WITHOUT rebooting the server. We would only need to create and run scripts using thi…
    A quick step-by-step overview of installing and configuring Carbonite Server Backup.
    To add imagery to an HTML email signature, you have two options available to you. You can either add a logo/image by embedding it directly into the signature or hosting it externally and linking to it. The vast majority of email clients display l…
    This video is in connection to the article "The case of a missing mobile phone (". It will help one to understand clearly the steps to track a lost android phone.

    759 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    14 Experts available now in Live!

    Get 1:1 Help Now