You need to ensure that users can access network resources only from computers that comply with the company policy