Device Checks

Device Checks

InstaSafe Secure Access allows you to define rules that would validate the devices for certain mandatory compliance which would govern whether or not the device is allowed to connect. Thus, non-compliant endpoints are prevented from connecting and accessing applications. The guides below will assist you with creating a new Device Check rule.





    • Related Articles

    • Configuring Device Checks for Windows Clients

      This article describes the step-by-step process to configure Device Checks on end-point devices per user and user group. InstaSafe Secure Access (ISA) enables administrators to define rules that check endpoint devices for mandatory compliances. These ...
    • Device Registration and Binding

      Instasafe Secure Access automatically captures certain device identification details when the User Agent is installed on an end-point. Using these parameters, it is possible to enforce ‘Device Binding’ on particular users. This would ensure that ...
    • User Agent

      A User Agent is a lightweight software client that must be installed on the endpoint devices and allows users to request access to applications. The Agent will connect you to the appropriate applications only after the multitude of security checks ...
    • Device Check Explained

      InstaSafe Secure Access (ISA) allows administrators to define rules that check endpoint devices for mandatory compliances. These rules determine whether a device is allowed to connect. As a result, non-compliant endpoints are prevented from accessing ...
    • Configuring Device Updates

      The device update feature enables the ISA web portal administrator to remotely install software updates, upgrades, or hotfixes for individual users or user groups. Within the DEVICES & CHECKS menu on the ISA web portal, administrators can create a ...