1 Introduction

This document provides an overview of the functionality and relationships of the protocols used in Network Access Protection (NAP). NAP verifies the identities of users and the proper software configuration of client computers and operating system states, such as anti-virus software and anti-malware, through network access processes.

NAP extends the Internet Engineering Task Force (IETF) network access architecture. Its primary extension is the introduction of client health evaluation as part of the process of determining network access. NAP uses underlying standards-based protocols for network access.