[Last Call] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Best practices for using mobile devices through a sonicwall with enforced AV client

Posted on 2012-09-14
2
Medium Priority
?
1,021 Views
Last Modified: 2013-12-09
Hello everyone!

At the office, all of the computers are windows machines of some recent or current version, and the sonicwall they're all behind enforces the use of an AV client [McAfee Security-as-a-Service], which is expected. If you didn't have that client installed on your machine and attempt to browse, it'll redirect you to a page asking you to download and install the AV client.

This is fine and dandy on anything running XP and up, however mobile devices get lost in the dust, and thus cannot access the internet via Wi-Fi.

I'm not too keen on Sonicwall, or what the wisest way would be to go about allowing iPads, iPhones, etc. onto the network without turning off the AV Client enforcement?

I had the idea of enforcing the client on a certain range of IPs, and setting up another range for static IPs for the mobile devices. Is this about all I can do? Am I missing something completely obvious to someone who is beyond a beginner in using Sonicwall?

Thanks in advance for any insight you can provide!
0
Comment
Question by:hashisayed
2 Comments
 
LVL 16

Accepted Solution

by:
Syed_M_Usman earned 2000 total points
ID: 38402698
Dear,

Yes you are right....
https://www.fuzeqna.com/sonicwallkb/consumer/kbdetail.asp?kbid=9704

i am not using Client AV so notable to test but i think you should be able to make Group of MAC Address (if you have less host) and enable :)
0
 

Author Closing Comment

by:hashisayed
ID: 38406425
Thanks for the link and your feedback! I highly appreciate it and it seems to be exactly what the KB states too for this situation. Apt answer, good sir!
0

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot has fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

After hours on line I found a solution which pointed to the inherited Active Directory permissions . You have to give/allow permissions to the "Exchange trusted subsystem" for the user in the Active Directory...
Learn how to use the free Acronis True Image app to easily transfer data between iPhones and Android phones.
CodeTwo Sync for iCloud (http://www.codetwo.com/sync-for-icloud?sts=6554) automatically synchronizes your Outlook 2016, 2013, 2010 or 2007 folders with iCloud folders available via iCloud Control Panel. This lets you automatically sync them with…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Suggested Courses

830 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question