SRA Overview | 49Benefits of End Point ControlThe SRA appliance supports End Point Control (EPC), which provides the following benefits:• Verifies that the user’s environment is secure before establishing a connection.• Protects sensitive data and• Ensures that your network is not compromised when accessed from devices in untrustedenvironments.• Protects the network from threats originating from client devices participating in the SRA.How Does End Point Control Work?The SRA appliance provides end point security controls by performing host integrity checkingand security protection mechanisms before a tunnel session is begun. Host integrity checkshelp ensure that the client system is in compliance with your organization’s security policy.SonicWALL end point security controls are tightly integrated with access control to analyze theWindows client system and apply access controls based on the results.Currently, EPC only supports the Windows NetExtender client. EPC enhancements aresupported on the Dell SonicWALL SRA 4600/4200/1600/1200 and Virtual Appliance platforms.Configuring End Point ControlPerform the following tasks to configure EPC:Step 1 Image the appliance with 6.0 firmware, as explained in the Dell SonicWALL SRA GettingStarted Guide.Step 2 Configure Device Profiles that allow or deny user authentication based on various global,group, or user attributes. See the “End Point Control > Device Profiles” section on page 204.Step 3 Add and configure groups and users to allow or deny End Point Control profiles. See the “EditEPC Settings” section on page 341.Step 4 Configure users to inherit their group profiles. See the “Edit EPC Settings” section on page 341.Step 5 Enable End Point Control. See the “End Point Control > Settings” section on page 210.Step 6 Connect to NetExtender and monitor the End Point Control log. See the “End Point Control >Log” section on page 211.Secure Virtual Assist OverviewThis section provides an introduction to the Secure Virtual Assist feature. This sectioncontains the following topics:• “What is Secure Virtual Assist?” on page 50• “Benefits of Secure Virtual Assist” on page 50• “How Does Secure Virtual Assist Work?” on page 50• “Launching a Secure Virtual Assist Technician Session” on page 52• “Performing Secure Virtual Assist Technician Tasks” on page 54• “Enabling a System for Secure Virtual Access” on page 58