Home > User Interface > Configuration > Compliance > Compliance Overview
Compliance Overview
A3 ensures a high level of security by
enforcing compliance to acceptable use policies. The compliance modules are:
Fingerbank profiling - performs device profiling or fingerprinting using the Fingerbank system. It accurately identifies endpoints on local networks including type, operating system, and device class. Fingerbank updates are downloaded automatically. Local device definitions are also supported.
Network Behavior Policy - analyzes client access to blacklisted IP addresses and/or
ports and raises security events if thresholds are exceeded.
Scans - active vulnerability scans are used to proactively scan endpoints for security problems. A3 includes integrations with Nessus, OpenVAS, and WMI (Windows Management Instrumentation); other scanners may be defined. Scan engines are associated with Connection Profiles and thus may be customized for SSID or operating system.
Security Events - security events, such as malware detection and unauthorized operating systems, are tied to actions, including quarantining endpoints, sending email alerts, and showing remediation instructions from the captive portal. In previous versions of A3, security events were known as violations.