16.1 Starting Network Access Detection

The Network Access Detection feature identifies unauthorized computers attempting to access the network and blocks them, effectively protecting confidential files, preventing data theft, and reducing the risk of virus intrusion, thereby enhancing overall network security.

Open the Network Access Detection window by selecting Tools → Network Access Detection from the menu.

Starting Network Access Detection

By default, Network Access Detection is not enabled, so the detection window will initially be empty. To start detection, go to System → Settings to configure the detection policy.

In the settings dialog, check Enable Network Access Detection. This will activate the detection feature, and all online computers within the subnet of installed clients will be scanned. In each subnet, one client machine acts as the detection agent, marked with a small red flag. This agent scans all computers within its subnet.

If Detect IP Address Range is set when enabling detection, only network devices within the specified IP range will be scanned, provided there are client-installed machines within that range.

Check Alert for New Machines by MAC Address to trigger alerts when a newly scanned MAC address is not listed in the existing computer list, indicating a new device. If this option is not checked, the system uses an IP+MAC combination management mode: if both IP and MAC match an existing entry, no alert is issued; if either IP or MAC is unmatched, the device is considered new and an alert is generated.

Computer List

Scanned computers are categorized as Client or Non-Client and displayed under the Client section in the computer list.

Client Type Description
Client Indicates a computer with the client module installed.
Unknown Indicates a computer without the client module installed. If Block all non-client computers from network access is checked in System → Settings, these computers will be blocked from communicating with protected machines.

You can choose to view the computer list in either IP+MAC Mode or MAC Mode.

View Mode Description
IP+MAC Mode A computer is uniquely identified by its IP and MAC address.
MAC Mode A computer is identified solely by its MAC address.

If a computer uses dynamically assigned IP addresses that change frequently, viewing in IP+MAC Mode may show multiple entries with the same MAC but different IPs. In MAC Mode, these entries are merged into a single computer, with the IP displayed as the most recent one.

Access Rule Settings

Administrators can configure access rules for computers based on IP, MAC, or IP+MAC, including the following types: Authorized, Protected, Blocked, and Normal.

Rule Type Description
IP/MAC Rule Sets a rule based on a specific IP and MAC address. The IP+MAC combination uniquely identifies a computer. If the computer is later detected, this rule will apply.
IP Rule An IP Rule sets a rule based solely on the IP address. If a detected computer matches this IP and has no existing rule, it will automatically inherit this IP-based rule.For example, if IP 192.168.1.1 is authorized, any scanned computer with this IP—regardless of its MAC—will automatically be treated as IP Authorized.
MAC Rule A MAC Rule applies a rule based solely on the MAC address. If a detected computer has this MAC and no existing rule, it will automatically adopt the MAC-based rule.For example, if MAC 6C-F0-49-64-FA-00 is set as authorized, any scanned computer with this MAC—regardless of its IP—will automatically be assigned MAC Authorized.
Authorized Authorized computers are never blocked. Use this for administrator machines or critical network devices to prevent accidental blocking due to missing client installation.
Protected Typically applied to important computers to block unauthorized access and prevent confidential data theft.
Blocked Blocked computers are restricted from communicating with protected machines once network access control is enabled.
Normal Normal indicates no access rule is set. Use this to clear any previous Authorized, Protected, or Blocked rules.

Note:

  • Setting an IP or MAC rule adds a custom record. For unrestricted MACs or IPs, the value will display as <Any>. When assigning a computer type, you can select multiple computers and apply the setting to all of them at once.