Fact-checked by Grok 2 weeks ago

Network Access Protection

Network Access Protection (NAP) is a Microsoft technology consisting of operating system components that enable the enforcement of health-based access control policies for devices attempting to connect to private networks. Introduced with Windows Server 2008 and client support starting from Windows Vista and Windows XP Service Pack 3, NAP allows network administrators to verify the compliance of client systems with predefined security and configuration requirements before granting full network access. Non-compliant devices are restricted to limited access, such as a remediation network, until they meet the policy criteria, thereby helping to protect the overall network integrity from potentially unhealthy or vulnerable machines. The core purpose of NAP is to maintain the health of networked computers by integrating health policy creation, enforcement, and remediation into the operating system. It evaluates client health through System Health Agents (SHAs) on the client side, which report the system's status, and System Health Validators (SHVs) on the server side, which assess compliance against policies. Enforcement occurs at various network points, including DHCP for IP address assignment, VPN connections, IEEE 802.1X for wired and wireless authentication, and IPsec for secure communications. This extensible platform supports both Microsoft-provided and third-party SHAs and SHVs, allowing customization for specific health checks like antivirus updates, firewall status, or patch levels. NAP's benefits include ongoing compliance monitoring, automatic remediation guidance for non-compliant systems, and the prevention of unauthorized or unhealthy devices from spreading threats across the network. However, it focuses solely on device health policy enforcement and does not address user authentication, malicious behavior detection, or broader security threats. Supported on Windows Server 2008 and later for policy servers, as well as compatible clients up to Windows 8.1, NAP integrates with Network Policy Server (NPS) in Windows Server for centralized policy management. Despite its innovations, NAP has been deprecated since Windows Server 2012 R2 and was fully removed from Windows Server 2016 and Windows 10 onward. Microsoft recommends alternatives such as System Center Configuration Manager for compliance monitoring and enforcement, or other network access control solutions for modern environments. As of 2025, NAP remains unsupported in current Windows versions, marking the end of its lifecycle in favor of more advanced security frameworks.

Introduction

Overview

Network Access Protection (NAP) is an extensible platform developed by Microsoft that enables organizations to verify the health status of client computers before allowing them full access to private networks. It consists of a set of operating system components designed to integrate with various network access technologies, allowing administrators to define and enforce health policies based on factors such as antivirus updates, firewall status, and operating system patches. The core purpose of NAP is to safeguard the integrity of the network by evaluating the compliance of connecting devices and restricting access for those that do not meet established health requirements. Non-compliant devices are isolated in a restricted or quarantined state, preventing potential threats from spreading while directing users toward remediation steps, such as installing missing security updates or enabling required protections. This approach ensures that only healthy systems can communicate freely, thereby reducing the risk of malware propagation and unauthorized vulnerabilities within the network environment. Within the broader context of Network Access Control (NAC), NAP functions primarily as a policy enforcement system focused on device health validation rather than comprehensive user authentication or intrusion prevention. It provides an infrastructure for system health agents (SHAs) on clients and system health validators (SHVs) on servers to assess compliance dynamically. Key terms include "compliant" states, where devices meet all policy criteria and receive full network access, versus "non-compliant" states, which trigger quarantine or limited connectivity until remediation is achieved. Enforcement can occur through methods such as VPN connections or DHCP assignments, but NAP emphasizes ongoing monitoring to maintain compliance post-access.

Goals and Benefits

Network Access Protection (NAP) aims to enforce organizational security policies by validating the health status of client devices before granting full network access, ensuring that only compliant systems—such as those with up-to-date antivirus software, enabled firewalls, and applied operating system patches—can connect. This validation process mitigates risks posed by compromised or outdated devices, which could otherwise introduce malware or vulnerabilities into the network. By restricting access for noncompliant clients, NAP helps maintain the overall integrity of the network while allowing limited connectivity for remediation. Key benefits include reduced spread of malware and other threats, as noncompliant devices are isolated or quarantined until they meet health requirements, preventing potential infections across the infrastructure. NAP supports automated remediation by directing affected clients to update servers or other resources for quick compliance restoration, minimizing downtime and manual intervention. Additionally, it enables centralized policy management through tools like Group Policy Objects (GPOs) or the Network Policy Server (NPS), allowing administrators to define and deploy consistent health standards across diverse environments, including roaming laptops and remote devices. For organizations, NAP provides auditable access controls that aid compliance with regulatory standards such as HIPAA and PCI-DSS, by enforcing endpoint security requirements and logging policy enforcement activities. However, NAP primarily addresses endpoint compliance rather than user authentication, integrating with systems like RADIUS for comprehensive access control without overlapping into identity verification.

History

Development and Initial Release

Network Access Protection (NAP) was initiated by Microsoft in the mid-2000s as a response to escalating endpoint security threats, including the proliferation of viruses, worms, and non-compliant devices accessing corporate networks. The technology was first publicly announced on July 13, 2004, at the Microsoft Worldwide Partner Conference, where over 25 industry leaders, including Computer Associates, Juniper Networks, McAfee, Symantec, and HP, demonstrated support for its extensible, standards-based architecture aimed at validating client health and enforcing policy compliance to reduce administrative costs and enhance network control. This development was influenced by emerging industry standards for Network Access Control (NAC), such as Cisco's NAC framework, with Microsoft emphasizing interoperability to align with broader ecosystem needs. The first public preview of NAP appeared in 2006, coinciding with demonstrations in Windows Vista betas and Bill Gates' RSA Conference speech highlighting its role in ensuring device health before network access. NAP debuted fully in late 2007 with the release to manufacturing (RTM) of Windows Server 2008 on November 27, 2007, alongside the NAP client integrated into Windows Vista (released to manufacturing on November 8, 2006) and later backported to Windows XP Service Pack 3. From launch, NAP supported key enforcement points including IPsec for domain isolation, DHCP for address assignment restrictions, VPN for remote access control, and 802.1X for wired and wireless authentication, enabling comprehensive policy enforcement across diverse network scenarios. NAP's design principles emphasized extensibility through published application programming interfaces (APIs) that allowed third-party developers to create custom System Health Agents (SHAs) and System Health Validators (SHVs) for health assessments, while maintaining a Windows-centric core for seamless integration within Microsoft's ecosystem. This approach facilitated interoperability with non-Microsoft solutions, such as antivirus vendors and network hardware, by supporting standards like Extensible Authentication Protocol (EAP) and enabling vendor-specific extensions without altering the core NAP infrastructure.

Evolution and Updates

Following its initial release, Network Access Protection (NAP) saw compatibility expansions to broader Windows ecosystems. In 2008, Microsoft backported NAP functionality to Windows XP Service Pack 3, allowing legacy clients to enforce health-based policies and integrate with NAP-enabled networks. This update included core NAP components such as the NAP agent and policy enforcement points, enabling XP systems to report compliance status via supported protocols like IPsec and DHCP. Major enhancements arrived with Windows 7 and Windows Server 2008 R2 in 2009, focusing on remediation and integration improvements. These versions introduced automatic referral of non-compliant clients to remediation servers, streamlining the process of guiding systems toward compliance without manual intervention. Additionally, NAP's IPsec enforcement was refined for more robust quarantine handling, and integration with Terminal Services Gateway was added to apply health checks during remote desktop sessions. In 2012, Windows 8 and Windows Server 2012 advanced NAP through tighter coupling with DirectAccess, enabling health validation as part of seamless remote connectivity. This integration allowed DirectAccess servers to leverage NAP for endpoint compliance checks before granting full intranet access, enhancing security for mobile workers without requiring VPN initiation. NAP remained extensible via APIs for third-party system health agents and validators, though support for non-Windows clients was limited, primarily relying on vendor extensions for Windows-based enforcement points. As organizations increasingly adopted cloud infrastructures, NAP's emphasis on on-premises policy enforcement introduced complexities in hybrid setups, where traditional network boundaries blurred and dynamic access models became prevalent. In 2013, Microsoft announced the deprecation of NAP with the release of Windows Server 2012 R2, indicating a strategic shift away from further investment in the technology. NAP continued to function fully in Windows 8.1 and Windows Server 2012 R2, serving as the final major supported versions, though Microsoft issued warnings about compatibility issues in future releases.

Architecture

Client-Side Components

The client-side components of Network Access Protection (NAP) form the NAP platform on endpoint devices, enabling the assessment and reporting of system health to enforce network access policies. These components include the NAP Agent, System Health Agents (SHAs), and Enforcement Clients (ECs), which collectively monitor compliance, generate health statements, and interface with network access methods. The NAP platform is integrated into Windows operating systems such as Windows XP with Service Pack 3, Windows Vista, and Windows Server 2008, allowing clients to participate in health-based access control. The NAP Agent, implemented as the napagent.exe service, serves as the central coordinator on the client device. It manages the overall health state of the system by collecting individual Statements of Health (SoHs) from various SHAs and aggregating them into a System Statement of Health (SSoH). The NAP Agent then facilitates communication between SHAs and ECs, ensuring that health data is prepared for transmission to network enforcement points. This service runs continuously to monitor changes in system health and trigger updates as needed. System Health Agents (SHAs) are modular components responsible for performing specific health checks on the client system and generating corresponding SoHs. Each SHA focuses on a particular aspect of compliance, such as antivirus software status, firewall configuration, or operating system update levels, using predefined policies to evaluate health. For instance, the Windows Security Health Agent (WSHA), included in the NAP platform, assesses the presence and currency of security features like antivirus and antispyware through integration with the Windows Security Center. Third-party developers can create custom SHAs to evaluate additional software or configurations, registering them via the System Health Agent API (e.g., interfaces like INapSystemHealthAgentBinding2) to interact with the NAP Agent and report status updates. Enforcement Clients (ECs) provide interfaces tailored to different network access technologies, obtaining the SSoH from the NAP Agent and transmitting it to the appropriate network enforcement points. Examples include the IPsec NAP EC, which handles secure VPN and IPsec connections; the DHCP NAP EC, used for wired Ethernet access via Dynamic Host Configuration Protocol; and the EAP NAP EC (also known as the 802.1X NAP EC), which supports wireless and wired authentication through Extensible Authentication Protocol over 802.1X. These ECs ensure that health validation occurs before full network access is granted, restricting non-compliant clients to limited or quarantined connectivity. The NAP client architecture integrates seamlessly with Windows APIs to enable efficient health reporting. SHAs leverage the System Health Agent API to bind to the NAP Agent and submit SoHs, while the NAP Agent compiles the SSoH and passes it to the relevant EC. Statement collection and transmission occur via SOAP over HTTP, allowing secure and standardized exchange of health data between client components and external enforcement mechanisms. This design supports extensibility for custom SHAs and ECs while maintaining compatibility with the Windows ecosystem.

Server-Side Components

The Network Policy Server (NPS) serves as the central component on the server side of Network Access Protection (NAP), functioning as a RADIUS server that handles authentication, authorization, and accounting for network access requests. It receives RADIUS Access-Request messages from enforcement points, extracts the client's System Statement of Health (SSoH), and forwards it to the NAP Administration Server for validation against configured health policies. NPS extends the functionality of the Internet Authentication Service (IAS) in earlier Windows versions and is integral to Windows Server 2008 and later for storing and enforcing NAP policies. It integrates with Active Directory Domain Services (AD DS) to authenticate user credentials and authorize access based on dial-in properties and network policies, enabling single sign-on across the domain. System Health Validators (SHVs) act as the server-side counterparts to client System Health Agents (SHAs), evaluating the SoH data from clients to determine compliance with organizational health requirements, such as antivirus signature updates or firewall status. Each SHV compares the client's reported health attributes against predefined policies and generates a System Statement of Health Response (SSoHR) indicating compliance or non-compliance. Windows Server includes the Windows Security Health Validator (WSHV) as a standard SHV for assessing core operating system health checks, while custom SHVs can be developed for vendor-specific requirements, such as third-party security software validation. SHVs communicate through the NAP Administration Server interface, supporting the SHV API for extensible health checks. Health Policy Servers provide the logical infrastructure for processing and validating client health data, often implemented on dedicated Windows Server 2008 systems to separate policy evaluation from enforcement for scalability and security. These servers host NPS and SHVs to analyze SSoH messages received via RADIUS and return SSoHR results, determining whether clients gain full network access or are restricted to a quarantine network. They integrate with AD DS for centralized policy distribution and management, allowing administrators to define health requirements at the domain level. For optimal deployment, multiple Health Policy Servers can be load-balanced to handle high volumes of validation requests. Remediation servers are specialized resources accessible only to non-compliant NAP clients in the restricted network, providing tools and updates to restore health without full access to the internal network. Examples include Windows Server Update Services (WSUS) for patch deployment or antivirus servers for signature updates, matched to specific SHAs on the client side. These servers enable automatic or guided remediation processes, after which clients can request re-evaluation for compliance. Deployment typically involves isolating them on the quarantine VLAN to prevent security risks during updates.

Functionality

Health Assessment Process

The health assessment process in Network Access Protection (NAP) evaluates a client computer's compliance with defined health policies during network access requests, such as VPN connections or DHCP lease renewals. This sequence ensures that only compliant clients gain full access, while non-compliant ones are restricted or remediated. The process relies on components like System Health Agents (SHAs) on the client and System Health Validators (SHVs) on the server, which assess specific health attributes without delving into their internal configurations. The process begins with client initiation, where the NAP Agent detects an access request and queries installed SHAs to generate individual health statements. These statements encapsulate the client's health data, such as security update status or antivirus presence, which the NAP Agent compiles into a single Statement of Health (SoH). The SoH is then signed and prepared for transmission. Next, the enforcement client within the NAP Agent encrypts the SoH and forwards it to the Network Enforcement Point (NEP), such as a VPN gateway or DHCP server. The NEP relays the encrypted SoH to the NPS, typically over a secure protocol like RADIUS, for centralized evaluation. This transmission ensures the integrity and confidentiality of the health data during transit. Upon receipt, the NPS performs validation by invoking registered SHVs to parse and verify the SoH against configured health policies. Each SHV checks corresponding attributes from its paired SHA, flagging any discrepancies, and the NPS aggregates these results to determine the overall compliance state: compliant, non-compliant, or unknown. The validation phase operates with a default timeout of 2000 milliseconds per SHV to prevent indefinite delays. Finally, the NPS generates and issues a Statement of Health Response (SoHR) to the NEP, which relays it back to the client. The SoHR specifies the compliance state and associated access permissions, enabling the enforcement point to grant, restrict, or quarantine access accordingly. If the process encounters errors, such as transmission failures or validation timeouts, the NPS logs detailed events in the Windows Event Viewer under the Network Policy and Access Services category for diagnostics, while the NAP client may initiate retry attempts based on the enforcement method's configuration.

Policy Enforcement Mechanisms

Network Access Protection (NAP) enforces policies through designated enforcement points that evaluate health assessment results and apply restrictions to non-compliant clients. These points include DHCP servers, which issue limited IP address leases to non-compliant devices, typically providing only restricted network configuration options such as a quarantine IP address range that isolates the client from full network resources. Similarly, VPN and IPsec enforcement methods restrict tunnel access by applying IP packet filters to limit traffic from non-compliant remote clients, allowing only essential communications while blocking broader network connectivity. For wired and wireless networks, 802.1X enforcement enables port-based quarantine, where switches or access points dynamically assign non-compliant clients to restricted access modes. Quarantine handling in NAP isolates non-compliant clients using VLAN assignment or dedicated subnet isolation to prevent unauthorized access to production resources. In 802.1X scenarios, enforcement points can reassign clients to a remediation VLAN upon detecting non-compliance, ensuring separation from healthy traffic flows. This quarantine is time-limited and includes periodic rechecks of the client's health status to determine if restrictions can be lifted, with the duration configurable based on network policy settings. The remediation flow for non-compliant clients grants limited access exclusively to designated update servers, such as those providing security patches or antivirus definitions, allowing the device to resolve compliance issues without exposing the network. Once remediation is complete, the NAP client automatically triggers a reassessment of its health state, prompting the enforcement point to reevaluate and potentially restore full access if compliance is achieved. NAP integrates with protocols like RADIUS for policy signaling, where the Network Policy Server (NPS) embeds health validation results in RADIUS Access-Request messages using vendor-specific attributes (VSAs) to communicate enforcement decisions to network devices. Additionally, enforcement actions and policy events are logged through the Windows Event Viewer, capturing details such as quarantine assignments and reassessment outcomes for auditing and troubleshooting purposes.

Deployment

System Requirements

Network Access Protection (NAP) client requirements include specific operating systems with the NAP Agent component pre-installed or available via updates. Supported client operating systems encompass Windows XP with Service Pack 3 (SP3) and later updates, Windows Vista, Windows 7, Windows 8, and Windows 8.1. The NAP Agent is integrated into these versions to enable health assessment and policy compliance reporting. Hardware prerequisites for clients align with the minimum specifications of the respective operating systems, such as a 1 GHz processor and 512 MB of RAM for Windows Vista and later clients to ensure adequate performance during health checks. Server-side requirements for NAP deployment necessitate Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, or Windows Server 2012 R2, where the Network Policy Server (NPS) role must be installed to handle health policy enforcement and validation. An Active Directory domain environment is essential for centralizing policy management and authentication through NPS. Servers should also possess sufficient network bandwidth to accommodate periodic health status requests and responses without impacting overall performance. Hardware needs mirror the base requirements for Windows Server 2008, including a 1.4 GHz processor and 512 MB RAM, though higher specifications are recommended for production environments with multiple clients. Network prerequisites focus on compatibility with NAP's enforcement mechanisms to restrict or grant access based on compliance. For DHCP enforcement, the network must include a DHCP server with NAP extensions enabled, typically on Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, or Windows Server 2012 R2. RADIUS support is required for 802.1X wired or wireless enforcement, utilizing NPS as the RADIUS server. Other methods like VPN or IPsec enforcement demand compatible network infrastructure, such as VPN gateways or IPsec policies configured on domain controllers. Third-party integrations require compatible System Health Agents (SHAs) and System Health Validators (SHVs) for evaluating non-Microsoft software, adhering to Microsoft's published NAP API for interoperability.

Configuration Steps

Configuring Network Access Protection (NAP) involves a series of steps using the Network Policy Server (NPS) in a Windows Server environment to enforce health-based access controls. These steps assume the system requirements, such as compatible Windows Server versions (e.g., 2008, 2012, or 2012 R2), are met. The process begins with role installation and progresses to policy definition, client deployment, and validation. Step 1: Install the NPS Role on Windows Server
The first step is to install the Network Policy and Access Services role, including the NPS role service, on the designated Windows Server machine. Open Server Manager, select Add Roles and Features, and navigate to the Network Policy and Access Services role. Check the box for Network Policy Server under Role Services, then complete the installation wizard. This enables NPS to function as the NAP health policy server for evaluating client compliance.
Step 2: Configure Health Policies in the NPS Console
Launch the NPS console from Server Manager (Tools > Network Policy Server). Expand Policies > Network Access Protection, and select Health Policies to create or edit policies. Define system health requirements by configuring System Health Validators (SHVs), such as the Windows Security Health Validator. For example, enable checks for required antivirus software presence and firewall activation to ensure clients meet security standards before granting full access. Associate these SHVs with specific health policies that determine compliance status.
Step 3: Set Network Policies for Enforcement Points
In the NPS console, under Policies > Network Policies, create new policies tailored to enforcement methods like VPN or DHCP. Specify conditions such as user groups or NAS port types, and link them to the health policies from Step 2. For VPN enforcement, for instance, configure the policy to require NAP compliance, granting full access only to healthy clients while restricting non-compliant ones. Set processing order to prioritize NAP-enabled policies.
Step 4: Deploy System Health Agents (SHAs) on Clients via Group Policy and Configure Remediation Servers
On domain-joined clients (Windows Vista or later), deploy SHAs using Group Policy. Open Group Policy Management Console, create or edit a GPO, and navigate to Computer Configuration > Policies > Windows Settings > Security Settings > System Services. Enable the Network Access Protection Agent service and configure enforcement clients (e.g., for VPN). Additionally, in the NPS console under Network Access Protection > Remediation Server Groups, define servers that provide updates (e.g., WSUS for patches) to non-compliant clients in restricted mode. Apply the GPO to target OUs.
Step 5: Testing the Configuration
Validate the setup by simulating a non-compliant client, such as disabling antivirus on a test machine. Attempt network access (e.g., via VPN), and verify that NPS logs show quarantine to restricted access, followed by reassessment after remediation. Use Event Viewer (under Applications and Services Logs > Microsoft > Windows > NetworkPolicyServer) to review authentication events and health validation results.
Best Practices
Begin deployment with a pilot group of users and devices to identify issues before full rollout. Monitor implementation using NPS event logs and accounting for auditing compliance enforcement. Ensure redundancy by deploying multiple NPS servers in a load-balanced configuration.

Deprecation and Alternatives

Reasons for Deprecation

Microsoft announced the deprecation of Network Access Protection (NAP) in Windows Server 2012 R2, marking the beginning of its phase-out from active development. This decision was formalized around 2013, with NAP fully removed in Windows Server 2016. The feature received no new enhancements after the 2012 R2 release, and its support was tied to the underlying operating system lifecycles, ending extended support for Windows Server 2008 R2 on January 14, 2020, and for Windows Server 2012 R2 on October 10, 2023. Technical limitations played a significant role in NAP's deprecation, including its limited functionality and inadequate support for evolving network environments. NAP struggled with poor scalability in hybrid and cloud setups, as it was designed primarily for on-premises, Windows-centric infrastructures without native integration for modern distributed systems. Maintenance complexity arose from its reliance on outdated enforcement methods, such as DHCP and IPsec. Additionally, NAP's incompatibility with non-domain-joined devices and bring-your-own-device (BYOD) scenarios limited its applicability in diverse endpoint ecosystems. Strategically, Microsoft's shift toward cloud-native security models accelerated NAP's obsolescence, emphasizing solutions like Azure Active Directory (Azure AD) and Microsoft Intune for endpoint compliance and access control. NAP's exclusive focus on Windows environments clashed with the growing prevalence of multi-platform, hybrid workforces, prompting a pivot to more flexible, identity-based security frameworks. The deprecation had notable impacts, including halted innovation and increased reliance on third-party or alternative Microsoft tools for network health enforcement, leaving legacy NAP deployments vulnerable post-support. Organizations using NAP faced migration pressures, as the technology's low adoption rate—never achieving widespread momentum—further justified its removal.

Modern Replacement Technologies

Microsoft has transitioned from Network Access Protection (NAP) to cloud-centric solutions that emphasize zero-trust principles and integrated device management. Always On VPN, combined with Microsoft Entra ID (formerly Azure AD) integration, serves as a key alternative for enforcing access policies in remote and hybrid environments. This setup enables persistent VPN connections with certificate-based authentication, allowing administrators to apply conditional access rules based on user identity, device state, and risk signals before granting network entry. Microsoft Intune provides mobile device management (MDM) capabilities that supersede NAP's health assessment functions, focusing on device compliance for both on-premises and cloud resources. Intune evaluates endpoints against predefined policies—such as OS version, encryption status, and antivirus presence—and integrates with network access control (NAC) partners to enforce compliance during connection attempts. For instance, non-compliant devices are redirected to the Intune portal for remediation, ensuring secure access without NAP's legacy infrastructure. For endpoint protection, Microsoft Defender for Endpoint offers real-time health monitoring and threat detection, replacing NAP's static checks with dynamic, AI-powered assessments. It integrates seamlessly with Entra Conditional Access to block access from high-risk devices, using signals like malware alerts or anomalous behavior to evaluate endpoint security posture continuously. This approach supports automated responses, such as isolating compromised devices, enhancing protection beyond NAP's periodic evaluations. In broader NAC scenarios, Entra ID Conditional Access acts as a cloud-native policy engine, evaluating access requests based on multifactor authentication, location, and device compliance for Microsoft 365 and on-premises resources via hybrid setups. Third-party solutions like Cisco Identity Services Engine (ISE) extend this by providing robust NAC for wired, wireless, and VPN networks, integrating with Intune to verify device enrollment and compliance before allowing connectivity. Other partners, including F5 BIG-IP and Aruba ClearPass, offer similar interoperability for diverse environments. Migration from NAP involves mapping existing policies to Intune compliance rules, such as converting SHV (System Health Validators) checks to Intune settings for software updates and firewall status. Microsoft recommends transitioning to the Intune Compliance Retrieval service, which uses certificate-based authentication with device IDs to query compliance status from NAC partners, avoiding disruptions from the deprecated Intune NAC service (supported until March 31, 2024). Hybrid configurations can leverage Network Policy Server (NPS) with the NPS Extension for Azure MFA, bridging legacy systems to modern Entra ID authentication during phased rollouts. These replacements offer advantages over NAP, including superior support for mobile and BYOD scenarios through cloud scalability, adoption of zero-trust models that verify every access request regardless of location, and AI-driven threat detection for proactive risk mitigation. Intune's remote management simplifies device resets and policy updates without on-premises servers, reducing administrative overhead while maintaining robust security.

References

  1. [1]
    Network Access Protection - Win32 apps - Microsoft Learn
    Aug 23, 2019 · Network Access Protection (NAP) is a set of operating system components that provide a platform for protected access to private networks.
  2. [2]
    About NAP - Win32 apps - Microsoft Learn
    Aug 23, 2019 · Network Access Protection (NAP) is designed to help administrators maintain the health of the computers on the network.
  3. [3]
    Network Policy and Access Services Overview
    ### Summary of Network Policy and Access Services (NAP's Role and End of Support)
  4. [4]
    Deprecated features - Configuration Manager - Microsoft Learn
    Configuration Manager has removed support for Network Access Protection. The feature has been deprecated in Windows Server 2012 R2, and is removed from Windows ...
  5. [5]
    Network Policy Server (NPS) overview - Microsoft Learn
    May 5, 2025 · You can use NPS to create and enforce organization-wide network access policies for connection request authentication and authorization.
  6. [6]
    [DOC] Downloads
    Network Access Protection (NAP) is a platform for Windows Server 2008 and Windows Vista. It provides policy enforcement components that help ensure that ...
  7. [7]
    [DOC] Regulatory Compliance Planning Guide - Microsoft Download Center
    ... HIPAA. ​ For more information about partner ... ​ For information about how to protect access to network assets using Network Access Protection ...
  8. [8]
    Industry Partners Demonstrate Broad Support For Network Access ...
    Microsoft anticipates that the initial release of Network Access Protection will be delivered with ...
  9. [9]
    Bill Gates: Microsoft's Security Vision and Strategy, RSA Conference ...
    Feb 14, 2006 · In this case, there's a new feature of Windows Server “Longhorn” and Windows Vista at work here, known as Network Access Protection or NAP.
  10. [10]
    Windows Server 2008 - Microsoft Lifecycle
    Start Date, Mainstream End Date, Extended End Date. Windows Server 2008, May 6, 2008, Jan 13, 2015, Jan 14, 2020. Releases. Expand table. Version, Start Date ...
  11. [11]
    [DOC] https://download.microsoft.com/download/b/b/5/bb50...
    IPsec Enforcement is the strongest form of limited network access in Network Access Protection ... 802.1X authentication, a VPN connection, or DHCP configuration.
  12. [12]
    [PDF] NAP – Windows Server 2008 R2 and Windows 7
    Integration Improvements. Terminal Server Gateway (TSG). NAP remediation integration with TSG. IPsec. NAP/IPsec operation is improved in the way security.
  13. [13]
    Understanding Network Access Protection (NAP) in Windows Server ...
    Mar 1, 2011 · Windows Server 2008 R2 can automatically refer clients to a remediation server before granting full network access. For example, a client that ...
  14. [14]
    DirectAccess, Windows 10, and Network Access Protection (NAP)
    Oct 13, 2015 · With that, Microsoft formally deprecated NAP in Windows Server 2012 R2, and removed it completely from Windows Server 2016. Crucially the ...
  15. [15]
    From On-Prem to Cloud: NAC's Evolution - Portnox
    Feb 25, 2025 · NAC evolved from on-premises to cloud, offering real-time threat detection, centralized management, and improved operational efficiency.
  16. [16]
    Features Removed or Deprecated in Windows Server 2012 R2
    Aug 31, 2016 · Networking. Network Access Protection (NAP) is deprecated. Other options for keeping client computers up to date and secure for remote access ...Missing: announces | Show results with:announces
  17. [17]
    Network Policy and Access Services Overview - Microsoft Learn
    Aug 31, 2016 · Network Access Protection (NAP). NAP is a client health policy creation, enforcement, and remediation technology.
  18. [18]
    NAP Client Architecture - Win32 apps - Microsoft Learn
    Apr 29, 2022 · A NAP client is a computer running Windows XP with Service Pack 3 (SP3), Windows Vista, or Windows Server 2008 that includes the NAP platform.
  19. [19]
    NAP Client and Server-side Component Communication - Win32 apps
    Aug 23, 2019 · The NAP Agent component can communicate with the NAP Administration Server component through the following process: The NAP Agent passes the ...
  20. [20]
    NAP Server-side Architecture - Win32 apps - Microsoft Learn
    Feb 20, 2020 · The three NAP client components (an SHA layer, the NAP Agent, and a NAP EC layer). · The four NAP server-side components (an SHV layer, the NAP ...
  21. [21]
    [MS-NAPOD]: Remediation | Microsoft Learn
    Feb 14, 2019 · Noncompliant computers can access the Remediation servers on the restricted network to obtain the necessary updates, anti-virus signatures, and ...
  22. [22]
    [MS-NAPOD]: Overview - Microsoft Learn
    Oct 30, 2024 · At this time, the NAP client requests the health state from all system health agents (SHA) and creates a statement of health (SoH). The SoH is ...
  23. [23]
    [MS-NAPOD]: Health Validation - Microsoft Learn
    Feb 14, 2019 · Trigger: The NAP client accumulates the SoH from a collection of SHAs including the Windows SHA [MS-WSH] and sends the SoH to the NPS. The ...Missing: steps | Show results with:steps
  24. [24]
    INapSystemHealthValidator::Validate method - Microsoft Learn
    Dec 11, 2020 · The default timeout for all SHVs is 2000 milliseconds. Using a value other than the default will change the timeout for all registered SHVs.Parameters · Return Value · RemarksMissing: Statement retry
  25. [25]
    Guidance for troubleshooting Network Policy Server - Microsoft Learn
    Jan 15, 2025 · This article provides guidance for troubleshooting Network Policy Server. The article includes a checklist for troubleshooting, a description of known issues,Troubleshooting Checklist · Step 2: Review Event Logs... · Common Issues And Solutions
  26. [26]
    Hardware Requirements for Windows Server | Microsoft Learn
    Jul 22, 2025 · Review the minimum hardware requirements for CPU, memory (RAM), storage, and network needed to install and run Windows Server.
  27. [27]
    Service overview and network port requirements - Windows Server
    Jan 15, 2025 · This article discusses the required network ports, protocols, and services that are used by Microsoft client and server operating systems, server-based ...Overview · System services ports
  28. [28]
    Install Network Policy Server | Microsoft Learn
    Mar 3, 2021 · You can use this topic to install Network Policy Server (NPS) by using either Windows PowerShell or the Add Roles and Features Wizard.Missing: NAP | Show results with:NAP
  29. [29]
    Configure Network Policies | Microsoft Learn
    Jul 29, 2021 · You can use this procedure to configure a new network policy in either the NPS console or the Remote Access console.Missing: Protection | Show results with:Protection
  30. [30]
    Demonstrate NAP DHCP Enforcement in a Test Lab - Microsoft
    Jul 15, 2024 · This paper contains an introduction to NAP and instructions for setting up a test lab to deploy NAP with the DHCP enforcement method. System ...
  31. [31]
    Network Policy Server Best Practices - Microsoft Learn
    Jul 29, 2021 · Before installing NPS, install and test each of your network access servers using local authentication methods before you configure them as ...Accounting · Authentication · Using Nps In Large...Missing: Protection | Show results with:Protection<|control11|><|separator|>
  32. [32]
    NAP in Windows 10 - Microsoft Q&A
    Nov 30, 2017 · Yes, Network Access Protection (NAP) is not available anymore with Windows 10. It was deprecated due to lack of support and limited functionality.
  33. [33]
    What is Microsoft NPS? - Portnox
    Is Microsoft NPS Deprecated? While Microsoft Network Policy Server (NPS) has not been officially deprecated, it feels like a forgotten and neglected product in ...
  34. [34]
    3 Reasons why Network Access Protection is being phased out.
    Apr 20, 2014 · For a technology that's deprecated, it gets pretty extensive coverage. There's even chapters on it in my Windows Server 2012 R2 books, simply ...<|control11|><|separator|>
  35. [35]
    what solution has replaced microsoft Network Access Protection (NAP)
    Mar 9, 2024 · NAP is a client health policy creation, enforcement, and remediation technology. With NAP, system administrators can establish and automatically enforce health ...
  36. [36]
    Conditional access for VPN connectivity using Microsoft Entra ID
    Dec 11, 2023 · In this how-to guide, you'll learn how to grant VPN users access your resources using Microsoft Entra Conditional Access.Prerequisites · Configure EAP-TLS to ignore...
  37. [37]
    Network access control (NAC) integration with Intune - Microsoft Learn
    Mar 3, 2025 · Fortinet FortiNAC-F 7.x and later. We will be deprecating the Intune NAC service in the future, so we recommend that you migrate to the ...
  38. [38]
    Configure Conditional Access in Microsoft Defender for Endpoint
    Sep 29, 2025 · Step 1: Turn on the Microsoft Intune connection from Microsoft Defender XDR · Step 2: Turn on the Defender for Endpoint integration in Intune ...
  39. [39]
    Microsoft Entra Conditional Access: Zero Trust Policy Engine
    Sep 23, 2025 · Conditional Access is Microsoft's Zero Trust policy engine taking signals from various sources into account when enforcing policy decisions.Microsoft Ignite · Entra ID Protection · Building · Securing identity with Zero Trust