Hi @Don_Paterson @Alex- ,
Just stumbled upon this thread. We are using both EPMS on-prem (for Win notebooks) and EpMaaS in cloud (for MacOS notebooks).
EPMS:
The on-prem EPMS is being used for years now, with the firewall blade being active in the connected/disconnected state.
The connected state is forced when the EPMS server is reachable by the notebook (meaning the client is connected to VPN or in the physical office). In this state we have configured the inbound/outbound rulebase to allow almost everything (this is the rulebase for the firewall blade only).
The disconnected state is forced when the EPMS is not reachable by the notebook (no client VPN connection or not in the physical office). In this state we have configured the inbound/outbound rulebase to block everything except DNS, DHCP traffic (to allow the notebook to get basic network connectivity) and our public IP range (to allow and force the client to connect to the remote VPN only). This all works like a charm for many years.
EpMaaS:
Recently we started adding MacOS notebooks to our network and started using EpMaaS in the cloud for them. The logic here is similar to the on-prem one, only it seems to be weakly documented an explained. The connection to the EpMaaS seems to always be in the connected state (as long as you have Internet connectivity) and is shown in the client GUI as connected (online) always. To view the real effective policy of the firewall blade you will need to check in the client GUI under Advanced -> View Policies.
To force the different policy for connected/disconnected state you need to use the option under client settings which says "Consider the client connected if" (as @Alex- wrote above) and add for example some internal resources that are only reachable on your network (example DC, DNS or some other server). Afterwards the policy and logic for the inbound/outbound rulebase in the firewall blade is the same as for the EPMS (for connected/disconnected state). Except the fact that on EPMS (SmartEndpoint) the GUI is more user-friendly and policies are much more visible than on the EpMaaS.
The "problem" we had, which I think is not visible enough and documented properly, is the Policy Operation Mode. So, on the EpMaaS under Endpoint Settings there is the Policy Operation Mode which is especially important for the Access and Client Settings. If used in Mixed mode it is forced to Users first (in example AD user or group) and Devices afterwards (in example AD machine or group). After setting it to Mixed mode you can change and edit the firewall blade rulebase (under Access & Compliance) for Users and Devices sequentially, like below, this may be the part where your policy isn't being properly matched :


Hope I was helpful and didn't over-complicate it too much 🙂