You can define “zones of trust” that provide different levels of access depending on the level of trust at the user’s end point. Connection requests are compared against device profiles you set up in AMC and are then assigned to the appropriate zone. See About End Point Control for more information.
To set up zones of trust
Set up a Deny zone. Deny zones are evaluated first. If there is a device profile match (for example, a certain file or registry key is found on the device), the user is denied access and logged out. See Creating a Deny Zone for more information.