Manage access with posture checks

Netzilo helps administrators control who can access their network by creating policies. These policies decide which groups of peers are allowed to interact with one another, based on criteria like port, protocol and traffic direction.

Administrators can further refine access control through posture checks to enhance their existing policies. For example, they can verify whether a peer is using a specified version of Netzilo, has the necessary version of an operating system, and is located within a permitted location before allowing it to join the network.

By adding these posture checks to the policies, Netzilo makes sure only devices that meet certain security requirements can access the network. This helps keep the network safe and follows the Zero Trust approach, which means not trusting any device by default.

Concepts

While we plan to expand the range of posture checks, these are the checks currently available for you to enforce:

  • Netzilo Client Version Check
  • Country & Region Check
  • Date & Time Check
  • Operating System Check
  • Peer Network Range Check
  • Peer Domain Check
  • Endpoint Security Settings Check
  • Advanced Endpoint Settings Check

high-level-dia

Netzilo Client Version Check

The Netzilo client version check ensures that only devices with the specified version of Netzilo installed can connect to the network, preventing security risks from outdated or incompatible versions.

high-level-dia

Geolocation (Country & Region) Check

The geolocation check examines the connecting device's geographical location based on its IP address. This check allows to either block or allow access from certain geographic regions, offering country-wide and city-level granularity.

high-level-dia

high-level-dia

Date & Time Check

The date and time rule ensures that access occurs only during the designated date and time intervals. Outside these intervals, the rule evaluates as false, and depending on the usage scenario, access may be restricted or additional conditions may be applied.

high-level-dia

high-level-dia

Operating System Check

The operating system version check evaluates the operating system (OS) version running on the connecting device. This check allows for enforcing minimum OS requirements, ensuring that only devices with up-to-date and secure operating systems can access network resources.

The check evaluates the actual OS version for Android, macOS, and iOS, while for Linux and Windows, it assesses the kernel version.

Below are some examples of OS versions for each operating system:

  • Android 14 Upside Down Cake: 14, 14.3
  • macOS 13 Ventura: 13, 13.6.4
  • macOS 14 Sonoma: 14, 14.3.1
  • iOS 16 / iPadOS 16: 16, 16.7.5
  • Linux kernel: 6, 6.7.5
  • Windows 10, version 22H2: 10.0.19045
  • Windows 11, version 23H2: 10.0.22631
  • Windows Server 2022, Version 21H2: 10.0.20348

high-level-dia

Peer Network Range Check

The peer network range check verifies if a device is in certain IP ranges before it can connect. This check is useful when wanting to control access based on the network location of a peer. For example, disabling a connection to a routing peer when the peer is connecting from the office network range.

high-level-dia

high-level-dia

Peer Domain Check

The peer domain check verifies if a device is joined into specified domains before it can connect. This check is useful when wanting to control access based on the joined domain of a peer. For example, connection is allowed if the peer is connecting from a corporate device.

high-level-dia

high-level-dia

Endpoint Security Settings Check

The endpoint security settings check verifies if the peer complies with security settings before it can connect. This check is useful when wanting to control access based on the security settings of a peer. For example, disabling a connection to a peer/routing peer when the peer is not complying with security measures.

  • Antivirus
  • Firewall
  • Disk Encryption
  • Screen Lock
  • OS Updates

high-level-dia

Antivirus Rule

The antivirus check verifies if an antivirus is installed, active and up-to-date.

Firewall Rule

The firewall rule verifies if a firewall is installed and active.

Disk Encryption Rule

The disk encryption rule verifies if disk encryption, such as BitLocker, is enabled.

Screen Lock Rule

The screen saver rule verifies if a screen saver with a password is enabled.

OS Updates Rule

The operating system updates rule verifies if operating system updates are on and up-to-date.

Advanced Endpoint Settings Check

The endpoint settings check verifies if the peer complies with various device settings before it can connect. This check is useful when controlling access based on the device status of a peer. For example, it will not allow a connection if the peer does not have specific registry keys on the device.

  • Netzilo Workspace
  • Virtual Device
  • Device Integrity
  • Registry Key & Value
  • File & Folder
  • Running Processes

high-level-dia

Netzilo Workspace Rule

This rule verifies that access is occurring through the Netzilo Workspace.

Virtual Device Rule

This rule verifies that access is being made from a non-virtual (physical) device.

Device Integrity Rule

This rule verifies that the accessing device is not cracked, rooted, or jailbroken.

Registry Key & Value

This rule verifies that specified registry keys and values exist on the device. The system supports regular expression input for specifying these values, such as SOFTWARE\Microsoft\Wind*?urrent*

high-level-dia

You can add registry key and value by clicking "Add Key" button.

high-level-dia

File & Folder

This rule verifies that the device contains specified files and folders. The system supports regular expression input for specifying these values, such as C:\Program Files\Netzilo*

high-level-dia

You can add folder and files by clicking "Add Path" button.

high-level-dia

Running Processes

This rule verifies that specified processes are running on the device. The system supports regular expression input for specifying these values, such as C:\Windows\System32\svc*.exe

high-level-dia

You can add running processes by clicking "Add Path" button.

high-level-dia

Managing posture checks

Posture checks are dynamic, and you can create a policy with multiple posture checks. A single posture check can also be applied across multiple policies. When managing posture checks, you can update them as per your requirements.

Deleting a posture check is only possible if it's not currently used in any policy. If a posture check is in use, you need to unassign it from the respective policy before you can delete it. This precaution ensures the continuity and integrity of your security setup.

Here are some steps to help you create and manage your posture checks effectively:

In the example below, we are creating a posture check that will only allow clients running Netzilo version 0.25.0 or higher to connect and access network resources.

Creating posture checks

Access the Access Control tab, then the Posture Checks section, and click Create Posture Check.

high-level-dia

This will bring up a screen for configuring posture checks, where you can configure settings.

high-level-dia

Select the Netzilo Client Version check option and Type in the desired Netzilo version; for this example, we are using :

  • Version: 0.25.0

high-level-dia

Click Save, and the Netzilo Client Version check will be enabled.

high-level-dia

Click Continue, fill out the form with the following information, and click Create Posture Check to save:

  • Name of the posture check: Netzilo Version > 0.25.0
  • Description: Allow Netzilo client with version 0.25.0 or greater

high-level-dia

Adding posture checks to policy

Navigate to the Access Control tab and select the Policies section.

high-level-dia

Choose the policy to which you want to assign the posture check. This will open the policy update screen. Then, select the Posture Checks tab.

high-level-dia

Click Browse Checks and select the posture check we created earlier, Netzilo Version > 0.25.0. Then, click Add Posture Checks.

high-level-dia

The Netzilo Version check will be assigned to the policy. Click Save Changes to save the policy updates.

high-level-dia