How Host Integrity works
Host Integrity ensures that client computers are protected and compliant with your company's security policies. You use Host Integrity policies to define, enforce, and restore the security of clients to secure enterprise networks and data.
Step 1: The client computer runs a Host Integrity check on the client computer.
The management server downloads the Host Integrity policy to the client computers in the assigned group. The client computers run the Host Integrity check, which compares each computer's configuration with the requirements that you add to the Host Integrity policy.
The Host Integrity policy checks for the existence for antivirus software, patches, hot fixes, and other security requirements. For example, the policy may check whether the latest patches have been applied to the operating system. See:
Step 2: The Host Integrity check passes or fails
You can also set up peer-to-peer authentication in the Firewall policy, which can grant or block inbound access to the remote computers that have the client installed. See:
Step 3: Non-compliant computers remediate a failed Host Integrity check (optional)
Step 4: The client continues to monitor compliance
The Host Integrity check actively monitors each client's compliance status. If at any time the client’s compliance status changes, so do the privileges of the computer.
You can view the results of the Host Integrity check in the Compliance log. See: