Secure Configuration Verification (SCV)

Secure Configuration Verification (SCV) makes sure that Remote Access client computers are configured in accordance with the Enterprise Security Policy.

Use SCV to:

  • Receive reports on the configuration of remote clients.

  • Confirm that the client complies with the organization's security policy.

  • Block connectivity from clients who do not comply.

SCV uses SCV checks on the invoked client and enforces according to the policy that you configure on the Security Management Server. SCV checks include sets of conditions that define a securely configured client system. Checks can include, for example, the user's browser configuration, the version of the Anti-Virus software installed on the desktop computer, and the operation of the personal firewall policy. These security checks are performed at pre-defined intervals by the Remote Access client. Based on the results of the SCV checks, the Security Gateway decides whether to allow or block connections from the client to the LAN.

  • If the client passes all the SCV checks, the client is compliant.

  • If the client fails one of the checks, the client is not compliant.

Note - SCV is not supported in SecuRemote.

If you have SmartEndpoint-managed Endpoint Security VPN, you can use SCV checks or the Endpoint Security Compliance blade. If SCV is configured on the Security Gateway then SCV is enforced. Clients report on their compliance status to the Security Gateway.