Intel Unite Solution - Plugin Guide for Protected Guest Access

Intel® Unite™ Solution – Plugin Guide for Protected Guest Access v1.9 Page 5 of 17
1.3 Recommended Security Controls
It is recommended that IT personnel follow the recommended security controls
mentioned below:
Turn off network bridging on the hub that is running Guest Access.
In an Active Directory environment, set Group Policy Object on the hub
which limits applications and users (GPO policies).
Deploy a firewall between Guest Access machines and corporate
connections in order to limit unauthorized traffic.
Ensure there is a firewall on unused ports.
Deploy software based solutions to prevent unauthorized executables from
running on Guest Access machines like McAfee* Application Control or
Windows* AppLocker.
o Go to http://www.mcafee.com/us/products/application-control.aspx for
more information on McAfee Application control.
o Go to https://technet.microsoft.com/itpro/windows/whats-new/whats-
new-windows-10-version-1507-and-1511 for more information on
Windows AppLocker.
Deploy hardware and software based solutions to prevent unauthorized
executables from running on Guest Access machines like Device Guard on
Windows* 10 devices.
o Go to https://technet.microsoft.com/en-us/itpro/windows/keep-
secure/device-guard-deployment-guide for more information on Device
Guard.
For additional information on how to disable network bridging:
o Go to https://technet.microsoft.com/en-
us/library/cc732103(v=ws.10).aspx