SonicWall Unified Management
Federal
Protect Federal Agencies and Networks with scalable, purpose-built cybersecurity solutions
Access to deal registration, MDF, sales and marketing tools, training and more
Find answers to your questions by searching across our knowledge base, community, technical documentation and video tutorials
This section describes some typical End Point Control scenarios that use zones and device profiles to classify connection requests and deploy End Point Control tools to clients.
Scenario 1: Employees Connecting from IT-Managed Laptops
Scenario 2: Employees Connecting from a Home PC
Scenario 3: Employees Connecting from a Public Kiosk
Scenario 4: Employee Connects from a PC with Google Desktop
Scenario 5: Employee Connects from a Mobile Device