mirror of
https://github.com/netbirdio/docs.git
synced 2026-04-16 07:26:35 +00:00
Fix Posture Checks images path
This commit is contained in:
@@ -38,43 +38,43 @@ Setting up posture checks in NetBird is straightforward:
|
||||
|
||||
Log in to your NetBird dashboard and navigate to `Posture Checks` in the left menu. Click `Create Posture Check` or edit an existing one.
|
||||
|
||||

|
||||

|
||||
|
||||
A pop-up window will open with two tabs: `Checks` and `Name & Description`.
|
||||
|
||||

|
||||

|
||||
|
||||
From here, you can [manage access with posture checks](https://docs.netbird.io/how-to/manage-posture-checks) based on several aspects:
|
||||
|
||||
**NetBird Client Version**: Restrict access to peers with specific NetBird client versions, thus ensuring that all devices connecting to the network use up-to-date, secure client software.
|
||||
|
||||

|
||||

|
||||
|
||||
**Country and Region**: Limit network access based on geographical location, helping comply with data regulations or restrict access from high-risk areas. Note that you have two tabs available for this: `Allow` (green) and `Block` (red), making it easy to set up your preferred access rules..
|
||||
|
||||

|
||||

|
||||
|
||||
**Peer Network Range**: This posture check lets you precisely control network access by specifying which IP ranges can connect to your network. You can create policies allowing only connections from approved locations, such as office networks or trusted remote work setups. Additionally, you can enhance security by blocking high-risk IP ranges working in tandem with geo-based posture checks. This granular control helps create a more secure network environment by limiting access to known, trusted sources while preventing connections from potentially risky or unauthorized IP addresses.
|
||||
|
||||

|
||||

|
||||
|
||||
**Operating System**: Restrict access based on the connecting device's OS, ensuring only approved and potentially more secure operating systems can connect.
|
||||
|
||||

|
||||

|
||||
|
||||
**Process**: [Limit network access based on specific applications or services running on the connecting device](https://netbird.io/knowledge-hub/limit-network-access-based-on-running-processes). By verifying specific applications or processes, you ensure that only devices running essential security software, such as antivirus, firewalls, or endpoint protection agents, can connect to your network, reducing the risk of malware entering your network through unprotected devices. It also aids in maintaining compliance with regulatory requirements by enforcing consistent security measures across all devices.
|
||||
|
||||
Furthermore, this process-based posture check allows you to create specific policies for different user groups or network segments based on their unique security needs. Working in conjunction with other posture checks in NetBird, this setting offers a comprehensive and user-friendly approach to network security.
|
||||
|
||||

|
||||

|
||||
|
||||
After enabling the desired posture check, go to the `Name & Description` tab. Here, enter a descriptive name for your newly created posture check and save it.
|
||||
|
||||

|
||||

|
||||
|
||||
You'll notice a gray dot to the left of the posture check name, indicating it's inactive. To activate the posture check, you need to link it to an access control policy.
|
||||
|
||||

|
||||

|
||||
|
||||
To apply a posture check:
|
||||
|
||||
@@ -84,14 +84,14 @@ To apply a posture check:
|
||||
|
||||
Note that you can add multiple posture checks to a single policy as needed for comprehensive security.
|
||||
|
||||

|
||||

|
||||
|
||||
After adding the posture check, it will appear in the `POSTURE CHECKS` column. For easy management, you can click on it to edit the access control policy, allowing you to add or remove posture checks as needed.
|
||||
|
||||

|
||||

|
||||
|
||||
If you revisit the `Posture Checks` dashboard, you'll notice a green dot next to your recently configured posture check. This color shift indicates that the posture check is now active and integrated into your network security framework, actively contributing to your system's protection.
|
||||
|
||||

|
||||

|
||||
|
||||
Following these steps, you can effectively implement and manage NetBird's Posture Checks, significantly enhancing your network's security posture.
|
||||
Reference in New Issue
Block a user