ForeScout Technologies CounterACT 6.3.4
Network access control (NAC) products are often seen as expensive and difficult to deploy. ForeScout's CounterACT claims to be anything but and in this review Dave Mitchell tests this latest virtual appliance.
Compared with many NAC products, we found CounterACT easy to deploy and, apart from setting up switch span ports, requires no major changes to the existing network infrastructure. Its policy-based security makes it very versatile allowing administrators to provide controlled, secure network access to managed, unmanaged and guest systems as they attempt to join the network.

The CounterACT Console is well designed and provides high levels of information about monitored systems and policy status.
The appliance then starts identifying all devices on the network and automatically populating the console with their details. The scanning process uses the open source Nmap utility and is swift as after only a few minutes CounterACT had listed all our Windows Server 2003 and 2008 systems, Windows XP, Vista and 7 clients and other network devices including firewalls, printers and even NAS appliances.
The interface is well designed with a left pane showing all discovered devices plus policies and their status. The pane below allows views to be filtered where you place hosts with common attributes in groups and apply NAC policies to them.
Predefined policies are provided to get you out of the starting blocks, but it's easy enough to create your own. A classification policy places all new systems in the correct group so, for example, any that haven't authenticated to a recognized server can be classed as guests where they will have the appropriate policy applied.
Rather than block access completely, the policies can provide self-service and remediation services to guest users. You can present them with a web login page and the details they enter will be checked against selected authentication servers.
Guest network access can be configured automatically by using an ACL (access control list) or by placing the user in a separate VLAN. If a system pops up that you really don't want on the network, the policy can interact with a network switch and disable the port the system was seen on. Alternatively, you can apply the virtual firewall and use rules in the policy that determine what it can communicate with.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Dave is an IT consultant and freelance journalist specialising in hands-on reviews of computer networking products covering all market sectors from small businesses to enterprises. Founder of Binary Testing Ltd – the UK’s premier independent network testing laboratory - Dave has over 45 years of experience in the IT industry.
Dave has produced many thousands of in-depth business networking product reviews from his lab which have been reproduced globally. Writing for ITPro and its sister title, PC Pro, he covers all areas of business IT infrastructure, including servers, storage, network security, data protection, cloud, infrastructure and services.
-
Dreamforce 2025 live: All the news and updates from on the ground in San Francisco
News We're live on the ground in San Francisco for Dreamforce 2025 – keep tabs on all of our rolling coverage from the annual Salesforce conference.
By Rory Bathgate Last updated
-
GTIA charts new course with bold funding model and renewed purpose
News Emerging from its split from CompTIA, the GTIA says it is redefining what a trade association can be, backed by a perpetual endowment that frees it to invest as it likes in the channel
By Christine Horton Published
-
This new Android attack could let hackers swipe 2FA codes and snoop on private messages – ‘Pixnapping’ affects Samsung and Google smartphones, but experts warn more could be at risk
News Pixnapping allows attackers to steal two-factor authentication (2FA) codes, private messages, and even financial information.
By Emma Woollacott Published