Device Compliance — EPS Policies¶
Overview¶
Endpoint Protection System (EPS) policies enforce device posture checks before granting access. A device that fails the EPS check is blocked or redirected to a restricted zone.
Step 1 — Create a base EPS policy¶
▶ How to Create an EPS Policy in HySecure
Step 2 — Domain-based EPS (corporate devices)¶
Restrict access to domain-joined machines only.
▶ How to Create a Domain EPS Policy in HySecure
Step 3 — IP-based EPS policies¶
Control access by Internal IP, WAN IP, or MAC address.
▶ How to Create an IP Address EPS Policy
▶ How to Create a MAC Address EPS Policy
▶ How to Create a WAN IP EPS Policy
Step 4 — Antivirus EPS policy¶
Verify that an antivirus is present and active on the endpoint.
▶ How to Create an Antivirus EPS Policy in HySecure
Step 5 — Windows Update EPS policy¶
Block devices that are not patched to a minimum update level.
▶ How to Configure a Windows Update EPS Policy in HySecure
Step 6 — Device ID policy¶
Tie access to a registered device identity.
▶ How to Create a Device ID Policy in HySecure
Step 7 — Endpoint Protection ACL¶
Combine EPS policies into ACL rules that gate application access.
▶ How to Create an Endpoint Protection ACL in HySecure
📖 Host Scan Policies Reference
Use case: Full reference for all EPS rule types, condition logic, and supported OS versions.
Use case: Understand how device profiles map to ACLs and how enforcement behaviour is applied per user group.