Back to Blog
Juniper networks host checker download6/13/2023 ![]() We will also spend some time discussing custom Host Checker policies and rules, as well as support for the Trusted Computing Group's (TCG's) Trusted Network Connect (TNC). In this section, we will begin by discussing how Host Checker works and is deployed, and various options and tools that you have at your disposal. You can deploy Host Checker to end systems in many ways, and as it has with all of its products, Juniper has emphasized granular control and implementation of this feature to empower you to have a wide variety of scalable options for deployment. It ensures that the host that is connecting to your network meets a certain set of criteria before it can gain access to resources. Host Checker does exactly what its name implies. Host Checker is essentially an application that is automatically provisioned to clients that connect to your network through the IVE. ![]() We will begin our discussion of how the IVE can extend your network's security to hosts connecting to your network through the IVE by introducing a very powerful tool called Host Checker.
0 Comments
Read More
Leave a Reply. |