When at the endpoint, when a user computer attempts to access the internal network for the first time, the system checks whether the accessing user computer complies with various security policies, such as network user authentication, anti-virus program installation, etc., and controls network access according to the pre-defined security policy, when security policies are not observed.