Field Guide 19
Pre-connection end-point integrity check
Test the connection
1. Authenticate to the Application Portal.
2. Click the icon for the Tunnel Set you created.
The Access Client loader appears and loads the Access Client.
3. If you get a certificate warning, accept the certificate.
4. If another authentication window appears, type your credentials and authenticate.
The resource you selected is now accessible.
Configure the connection in the Access Client
The Access Client refers to the WatchGuard SSL device as an Access Point.
1. In the Access Client Connection Alert dialog box, select the Always trust connections from this
Access Point check box.
2. Click Accept.
The WatchGuard SSL device is added to the Trusted Access Points list, and connection alerts do not appear after
that for computers behind that device.
To confirm the device was added to the Trusted Access Points list:
1. Click in the Windows system tray and select Preferences.
The Access Client Preferences dialog box appears.
2. Click the Trusted Access Points tab.
3. Review the list of trusted WatchGuard SSL devices.
Pre-connection end-point integrity check
You can use WatchGuard SSL End-Point Integrity to verify that client devices meet your defined security
profile, before users can access your internal resources through the Application Portal. After users
authenticate, but before they connect to network resources, you can require an assessment of their
computers to find whether they meet your security requirements. This is the Client Assessment process, which
is performed by the WatchGuard SSL Assessment Agent. This process checks that all security requirements are
met, such as security patch level, anti-virus protection, client firewall protection, or home domain. The
Assessment Agent automatically launches in a client Web browser.
You can configure the WatchGuard SSL device to allow access only if a specific process is active on the client
computer. You can apply this type of access rule to any resource. Some examples of processes are executable
files, anti-virus software, or client firewall software. This subsequent procedure uses notepad.exe and modifies
a file sharing resource as an example.
Steps
Enable real-time scan
Create a new access rule to check whether a specific process is running on the client
Protect a file share resource with the new access rule
Trigger Assessment