Preventing access from non-compliant computers to restricted zones and areas on SharePoint Web applications in IAG SP2

Applies To: Intelligent Application Gateway (IAG)

This topic describes how you can use the application’s Restricted Zone policy so that end users cannot access sensitive zones and areas of the application, such as administrative zones, if the end user's computer does not meet the security policy requirements.

To enable this option, when you finish adding the application to the trunk, you need to assign a unique Restricted Zone policy to the application, as described below. The defined zones and areas are blocked on the server side, and users who are blocked are notified accordingly.

To prevent access to restricted zones and areas

  1. On the desktop of the computer running IAG, click Start, point to All Programs, point to Whale Communications IAG, and then click Configuration.

  2. If a password is required, enter it, and then click OK.

  3. In the Configuration console, on the Application Properties dialog box, on the Web Settings tab, verify that the Activate Restricted Zone check box is selected, and then on the General tab, click Manage Policies.

  4. On the Manage Policies and Expressions dialog box, in the Policies group, select the Default Web Application Restricted ZoneAccess policy, and then click Edit Policy.

  5. On the Policy Editor dialog box, you can edit the policy in order to comply with your corporate policy, so that noncompliant computers (such as computers that don't run a firewall) are denied access to the administrative zones. For more information, see Managing client endpoint policies_IAG.

  6. On the Policy Editor dialog box, click OK, then on the Manage Policies and Expressions dialog box, click Close, and then on the Application Properties dialog box, click OK.

  7. On the toolbar of the Configuration console, click the Activate Configuration icon, and then on the Activate Configuration dialog box, click Activate.

    When the configuration is activated, the message "IAG configuration activated successfully" appears. Access to the zones and to the areas that you define will be blocked on the client side, the server side, and on endpoint computers that do not comply with the security policy that you define here.