Security Solutions

2-30
Customer Needs Assessment
Evaluate the Existing Network Environment
Table 2-5. Recording Information about Workstations and Laptops
When you have created a comprehensive list of OSs and applications, you
can begin to consider how to ensure that endpoints are patched and free
from viruses and other malware before they connect to the network. (For
more information, see “Determine Your Endpoint Integrity Requirements”
on page 2-34.)
Other Endpoints
After you document the workstations and laptops, you can begin to list the
other endpoints on the network. For example, if the network supports Voice
over IP (VoIP), what capabilities do the VoIP phones have? Which access
methods do they support? Which users are using these VoIP phones? Where
do these phones attach to the network? Do they use a wireless or wired
connection?
What other endpoints attach to the network, and do they support 802.1X?
For example, are users accessing the network through personal digital assis-
tants (PDAs) or smartphones? Do your network printers support 802.1X?
Printer vendors such as HP are adding 802.1X functionality to their printers
in an effort to help you secure the network. You can then prevent users from
temporarily unplugging a printer and plugging their laptop or even an AP into
the printer’s jack.
Hardware Vendor Laptop or
Workstation
Quantity User Operating
System
Applications Location on
Network
Hewlett-Packard Laptops 105 Accounting
employees
Windows XP Microsoft Office
applications
•Email
•IM
Inhouse
accounting
program
Building 1,
southeast
corner
when using
a wired
connection