has posted an article about Network Access Protection: An Introduction to Network Access Protection (Part 1) by Brien Posey.This is a good overview and introduction to NAP. The next article will go into configuration details.

One aspect of network security that is frustrating for many administrators is that they have no control over the configuration of remote computers. Although the corporate network might be running a highly secure configuration, there is presently nothing to prevent remote user from connecting to the corporate network using a computer that is infested with viruses or that contains outdated patches.