Secure Mobile Access 12.4 Deployment Guide

Quarantining Employees on Untrusted Systems

Follow these configuration steps to quarantine an employee who logs in using a device that doesn’t match any of your device profiles. The only resources available will be those that you set up. You could, for example, display a customized page with links to Web resources for bringing the user’s system into compliance with your security policies.

To quarantine an employee on Untrusted systems

  1. Define a device profile on the Device Profile Definition page with an attribute referencing an application or other attribute that is unique to your organization.

  2. Configure a Standard zone that references the device profile in Step 1.

  3. Configure a Quarantine zone that displays a custom Web page with links to resources for bringing a user’s system into compliance.

  4. Create a community that references the Standard zone you created, and identify the Quarantine zone as your fallback option. Connection requests from devices that don’t match the trusted profile are automatically assigned to the Quarantine zone.

Was This Article Helpful?

Help us to improve our support portal

Techdocs Article Helpful form

  • Hidden
  • Hidden

Techdocs Article NOT Helpful form

  • Still can't find what you're looking for? Try our knowledge base or ask our community for more help.
  • Hidden
  • Hidden