{"id":7879,"date":"2018-05-21T15:46:47","date_gmt":"2018-05-21T19:46:47","guid":{"rendered":"https:\/\/www.med.unc.edu\/it\/?page_id=7879"},"modified":"2018-05-23T10:53:03","modified_gmt":"2018-05-23T14:53:03","slug":"nac-remediation-guide","status":"publish","type":"page","link":"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/nac-remediation-guide\/","title":{"rendered":"NAC Remediation Guide"},"content":{"rendered":"<p>To connect to the UNC Campus Network, it has always been the case that a user&#8217;s computer must meet certain minimum requirements, including having anti-virus software installed, running, and up-to-date. It must also have specific operating system updates installed to prevent the computer from being compromised.<\/p>\n<p>Network Access Control (NAC) is a proactive, end-user networking solution for wired and Wi-Fi connections that allows us to identify potential problems on a computer before it accesses the web. The system can educate the user about any potential vulnerability and then provide a link or resource for them to resolve it on their own. This solution is highly customizable and will be set up in the best interest of all campus network users.<\/p>\n<h2>Connecting to the network<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-7885\" src=\"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2018\/05\/1-2-150x72.jpg\" alt=\"\" width=\"260\" height=\"125\" srcset=\"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2018\/05\/1-2-150x72.jpg 150w, https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2018\/05\/1-2-300x143.jpg 300w, https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2018\/05\/1-2.jpg 306w\" sizes=\"auto, (max-width: 260px) 100vw, 260px\" \/><\/p>\n<p><a href=\"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2018\/05\/9488018b-f475-4d70-9a0d-a57851284701.jpeg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-7887\" src=\"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2018\/05\/9488018b-f475-4d70-9a0d-a57851284701-150x120.jpeg\" alt=\"\" width=\"253\" height=\"202\" srcset=\"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2018\/05\/9488018b-f475-4d70-9a0d-a57851284701-150x120.jpeg 150w, https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2018\/05\/9488018b-f475-4d70-9a0d-a57851284701.jpeg 200w\" sizes=\"auto, (max-width: 253px) 100vw, 253px\" \/><\/a>With NAC enabled in your building, if your computer does not meet the minimum requirements for the UNC network, you will be directed to the &#8220;Welcome to the network&#8221; screen above when you open your web browser.\u00a0 Any website entered should be redirected to this site until all requirements have been met.\u00a0 To access the internet from here you must follow the steps below:<\/p>\n<ol>\n<li>Click on the link <strong>Please click here to connect to the network<\/strong> to visit the remediation site. This remediation site asks that you download and install the NAC client.<\/li>\n<li>Click on <strong>Step 1: Download &amp; Install<\/strong> to start the download. Depending on your web browser, you can choose to save the file or run it directly.\n<ul>\n<li>If you choose to save it, you will need find the location where it was downloaded and run it.<\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>If you&#8217;re running Windows Vista or Windows 7, you may also see a prompt with the publisher &#8220;Enterasys Networks&#8221; asking, &#8220;Do you want to allow the following program to install software on this computer?&#8221; Answer <strong>Yes <\/strong>to this question and wait for the NAC to finish installing.<\/li>\n<\/ul>\n<\/li>\n<li>\n<div style=\"text-align: left;\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-7888 alignright\" src=\"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2018\/05\/e1d2653b-af68-4db9-a407-c684bf8234a1-150x87.jpeg\" alt=\"\" width=\"233\" height=\"135\" srcset=\"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2018\/05\/e1d2653b-af68-4db9-a407-c684bf8234a1-150x87.jpeg 150w, https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2018\/05\/e1d2653b-af68-4db9-a407-c684bf8234a1.jpeg 200w\" sizes=\"auto, (max-width: 233px) 100vw, 233px\" \/>When the installation has finished, click on<strong> Step 2: Scan My Machine<\/strong>. This will rescan the computer to check for the NAC client again, as well as search for other issues which may require remediation.<\/div>\n<\/li>\n<li>Please wait while your computer is being scanned.<\/li>\n<li>If the NAC installed successfully, you should be automatically redirected to <a class=\"external-link\" href=\"http:\/\/www.med.unc.edu\" target=\"_blank\" rel=\"noopener\">http:\/\/www.med.unc.edu<\/a>.<\/li>\n<\/ol>\n<h2><a name=\"installationfaqs\"><\/a>NAC Agent Installation Tips<\/h2>\n<figure id=\"attachment_7889\" class=\"thumbnail wp-caption alignnone\" style=\"width: 330px\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-7889\" src=\"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2018\/05\/image-150x53.jpeg\" alt=\"\" width=\"320\" height=\"113\" srcset=\"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2018\/05\/image-150x53.jpeg 150w, https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2018\/05\/image-300x106.jpeg 300w, https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2018\/05\/image.jpeg 350w\" sizes=\"auto, (max-width: 320px) 100vw, 320px\" \/><figcaption class=\"caption wp-caption-text\">Double-click the NAC msi file to install the NAC agent<\/figcaption><\/figure>\n<p><strong>If you use Mozilla Firefox:<\/strong> be sure to navigate to the location where the agent installation file was saved or view the Firefox Downloads menu (see screenshot) and double-click to install the NAC agent. \u00a0<strong>The agent must be installed after it is downloaded to gain access to the network.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>To connect to the UNC Campus Network, it has always been the case that a user&#8217;s computer must meet certain minimum requirements, including having anti-virus software installed, running, and up-to-date. It must also have specific operating system updates installed to prevent the computer from being compromised. Network Access Control (NAC) is a proactive, end-user networking &hellip; <a href=\"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/nac-remediation-guide\/\" aria-label=\"Read more about NAC Remediation Guide\">Read more<\/a><\/p>\n","protected":false},"author":72183,"featured_media":0,"parent":7347,"menu_order":12,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"layout":"","cellInformation":"","apiCallInformation":"","footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-7879","page","type-page","status-publish","hentry","odd"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NAC Remediation Guide | Information Technology<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/nac-remediation-guide\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NAC Remediation Guide | Information Technology\" \/>\n<meta property=\"og:description\" content=\"To connect to the UNC Campus Network, it has always been the case that a user&#8217;s computer must meet certain minimum requirements, including having anti-virus software installed, running, and up-to-date. It must also have specific operating system updates installed to prevent the computer from being compromised. Network Access Control (NAC) is a proactive, end-user networking &hellip; Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/nac-remediation-guide\/\" \/>\n<meta property=\"og:site_name\" content=\"Information Technology\" \/>\n<meta property=\"article:modified_time\" content=\"2018-05-23T14:53:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2018\/05\/1-2-150x72.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/nac-remediation-guide\/\",\"url\":\"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/nac-remediation-guide\/\",\"name\":\"NAC Remediation Guide | Information Technology\",\"isPartOf\":{\"@id\":\"https:\/\/www.med.unc.edu\/it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/nac-remediation-guide\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/nac-remediation-guide\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2018\/05\/1-2-150x72.jpg\",\"datePublished\":\"2018-05-21T19:46:47+00:00\",\"dateModified\":\"2018-05-23T14:53:03+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/nac-remediation-guide\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/nac-remediation-guide\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/nac-remediation-guide\/#primaryimage\",\"url\":\"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2018\/05\/1-2.jpg\",\"contentUrl\":\"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2018\/05\/1-2.jpg\",\"width\":306,\"height\":146},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/nac-remediation-guide\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.med.unc.edu\/it\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Self Help Guides\",\"item\":\"https:\/\/www.med.unc.edu\/it\/guide\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Network Connections\",\"item\":\"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Network Access Control\",\"item\":\"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"NAC Remediation Guide\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.med.unc.edu\/it\/#website\",\"url\":\"https:\/\/www.med.unc.edu\/it\/\",\"name\":\"School of Medicine IT\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.med.unc.edu\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.med.unc.edu\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.med.unc.edu\/it\/#organization\",\"name\":\"UNC School of Medicine Information Technology\",\"url\":\"https:\/\/www.med.unc.edu\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.med.unc.edu\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2019\/03\/InformationTechnology_logo_rgb_h.png\",\"contentUrl\":\"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2019\/03\/InformationTechnology_logo_rgb_h.png\",\"width\":1217,\"height\":151,\"caption\":\"UNC School of Medicine Information Technology\"},\"image\":{\"@id\":\"https:\/\/www.med.unc.edu\/it\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NAC Remediation Guide | Information Technology","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/nac-remediation-guide\/","og_locale":"en_US","og_type":"article","og_title":"NAC Remediation Guide | Information Technology","og_description":"To connect to the UNC Campus Network, it has always been the case that a user&#8217;s computer must meet certain minimum requirements, including having anti-virus software installed, running, and up-to-date. It must also have specific operating system updates installed to prevent the computer from being compromised. Network Access Control (NAC) is a proactive, end-user networking &hellip; Read more","og_url":"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/nac-remediation-guide\/","og_site_name":"Information Technology","article_modified_time":"2018-05-23T14:53:03+00:00","og_image":[{"url":"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2018\/05\/1-2-150x72.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/nac-remediation-guide\/","url":"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/nac-remediation-guide\/","name":"NAC Remediation Guide | Information Technology","isPartOf":{"@id":"https:\/\/www.med.unc.edu\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/nac-remediation-guide\/#primaryimage"},"image":{"@id":"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/nac-remediation-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2018\/05\/1-2-150x72.jpg","datePublished":"2018-05-21T19:46:47+00:00","dateModified":"2018-05-23T14:53:03+00:00","breadcrumb":{"@id":"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/nac-remediation-guide\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/nac-remediation-guide\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/nac-remediation-guide\/#primaryimage","url":"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2018\/05\/1-2.jpg","contentUrl":"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2018\/05\/1-2.jpg","width":306,"height":146},{"@type":"BreadcrumbList","@id":"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/nac-remediation-guide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.med.unc.edu\/it\/"},{"@type":"ListItem","position":2,"name":"Self Help Guides","item":"https:\/\/www.med.unc.edu\/it\/guide\/"},{"@type":"ListItem","position":3,"name":"Network Connections","item":"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/"},{"@type":"ListItem","position":4,"name":"Network Access Control","item":"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/"},{"@type":"ListItem","position":5,"name":"NAC Remediation Guide"}]},{"@type":"WebSite","@id":"https:\/\/www.med.unc.edu\/it\/#website","url":"https:\/\/www.med.unc.edu\/it\/","name":"School of Medicine IT","description":"","publisher":{"@id":"https:\/\/www.med.unc.edu\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.med.unc.edu\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.med.unc.edu\/it\/#organization","name":"UNC School of Medicine Information Technology","url":"https:\/\/www.med.unc.edu\/it\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.med.unc.edu\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2019\/03\/InformationTechnology_logo_rgb_h.png","contentUrl":"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2019\/03\/InformationTechnology_logo_rgb_h.png","width":1217,"height":151,"caption":"UNC School of Medicine Information Technology"},"image":{"@id":"https:\/\/www.med.unc.edu\/it\/#\/schema\/logo\/image\/"}}]}},"_links_to":[],"_links_to_target":[],"_links":{"self":[{"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/pages\/7879","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/users\/72183"}],"replies":[{"embeddable":true,"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/comments?post=7879"}],"version-history":[{"count":0,"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/pages\/7879\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/pages\/7347"}],"wp:attachment":[{"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/media?parent=7879"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}