Skip to main content

Device Access Control on Zenconsole

Published on:
.
1 min read

Zenarmor provides a robust Device Access Control feature that enables users to classify identified devices as either trusted or untrusted and impose limitations on unauthorized device access to the network via Zenarmor policies.

By preventing unauthorized device access, the Device Access Control feature essentially grants IT teams more granular control over the devices connected to the network, thereby bolstering network security and averting potential data breaches. Furthermore, this functionality streamlines the process of IT asset management (ITAM) by allowing IT teams to govern devices centralized from a single pane of glass. This functionality enables IT teams to effortlessly execute the subsequent tasks:

  • Set Access Rules: Access rules specify which resources devices are permitted to access and the manner in which they are permitted to connect to the network.
  • Prevent Unauthorized Access: Zenarmor has the capability to impede the connection of devices lacking trust in the network. This prevents unauthorized access by users and contributes to your zero-trust strategy, thereby reducing your overall risk.
  • Enforce Device Compliance: By implementing device compliance rules, IT departments can guarantee that all devices satisfy specific security criteria prior to establishing a network connection.
note

The Device Access Control feature is only available for the Zenarmor Paid Editions. To gain the benefit of the Device Access Control feature and for more information, see the plans & pricing.

Benefits of Zenarmor Device Access Control

The principal benefits of the Zenarmor Device Access Control feature are as follows:

  • Enhanced Network Security: Zenarmor's device access control functionalities assist organizations in bolstering network security by thwarting unauthorized access, enforcing device conformance, and mitigating security risks associated with untrusted devices.
  • Reduced Risk of Data Breaches: One potential benefit of Zenarmor is its ability to enforce device compliance and prevent data breaches. This capability empowers organizations to protect sensitive information from unauthorized entry and potential data breaches.
  • Streamlined IT Operations: Zenarmor's capability to enforce security policies across the network and centrally regulate device access streamlines device management, thereby facilitating streamlined IT operations.

By capitalizing on the capabilities of device identification and access control, IT teams can efficiently oversee their IT assets, thereby guaranteeing network security, adherence to regulations, and optimal utilization of resources. Zenarmor augments the capabilities of existing ITAM tools by providing comprehensive control over device access and real-time visibility of devices. This enables IT teams to guarantee the maintenance of a secure and compliant IT environment and make informed decisions.

How to Enable Device Access Control?

You can easily enable Device Access Control by clicking on the Block Untrusted Devices toggle button on the policy configuration page.

Figure 1. Block Untrusted Devices in Default Policy

warning

After Zenarmor has been successfully deployed on your firewall, navigate to the Zenarmor Devices page in order to investigate the devices on your network. Prior to implementing policy-based device access control, verify that the devices are trusted. By default, all newly detected devices are classified as "Untrusted" by Zenarmor. Unknown or suspicious devices ought to be treated with skepticism.

These devices are unable to establish a network connection when Device Access Control is enabled until you manually authenticate and grant them the status of "Trusted".

Best Practice

To prevent unauthorized access by unknown devices to your network, enable Block Untrusted Devices on rules that match a wide variety of endpoints, including networks and VLANs.

Here is the hands on video for Zenarmor Device Identification and Access Control: