Skip to content

Device Compliance — EPS Policies

Overview

Endpoint Protection System (EPS) policies enforce device posture checks before granting access. A device that fails the EPS check is blocked or redirected to a restricted zone.


Step 1 — Create a base EPS policy

▶ How to Create an EPS Policy in HySecure


Step 2 — Domain-based EPS (corporate devices)

Restrict access to domain-joined machines only.

▶ How to Create a Domain EPS Policy in HySecure


Step 3 — IP-based EPS policies

Control access by Internal IP, WAN IP, or MAC address.

▶ How to Create an IP Address EPS Policy

▶ How to Create a MAC Address EPS Policy

▶ How to Create a WAN IP EPS Policy


Step 4 — Antivirus EPS policy

Verify that an antivirus is present and active on the endpoint.

▶ How to Create an Antivirus EPS Policy in HySecure


Step 5 — Windows Update EPS policy

Block devices that are not patched to a minimum update level.

▶ How to Configure a Windows Update EPS Policy in HySecure


Step 6 — Device ID policy

Tie access to a registered device identity.

▶ How to Create a Device ID Policy in HySecure


Step 7 — Endpoint Protection ACL

Combine EPS policies into ACL rules that gate application access.

▶ How to Create an Endpoint Protection ACL in HySecure


📖 Host Scan Policies Reference

Use case: Full reference for all EPS rule types, condition logic, and supported OS versions.

📖 Device Profiles Reference

Use case: Understand how device profiles map to ACLs and how enforcement behaviour is applied per user group.


Next: Access Control Lists →