RETIRED CONTENTPlease note that the content on this page is retired. This content is not maintained and may contain information or links that are out of date.
This exercise is part of the overall workshop, Secure the Network against Remote & Rogue Endpoints in Four Steps – specifically centered around the current state examination. Using these handouts, the facilitator will take the group through determining where the organization is in terms of LAN, WLAN, BYOD and remote access NAC capabilities.
This template includes the following sections:
- Capture current and desired NAC capabilities for the following options:
- Remote access NAC implementations
- Each handout includes a table related to typical NAC features under each option.
Use the template in conjunction with the NAC Capture Tool to determine your NAC implementation priorities.