A new approach to network security includes manipulating an access point
such that an initial communication from an external device is passed to a
restricted subset of a computing network including a gatekeeper. The
gatekeeper is configured to enforce a security policy against the
external device before granting access to a less-restricted subset of the
computing network. If requirements of the security policy are satisfied,
then the gatekeeper reconfigures the access point such that further
communication from the external device may be received by elements of the
less-restricted subset. Enforcement of the security policy optionally
includes performing a security audit of the external device.