Checking security...

Verifying device integrity...
Checking organizational policy...
Establishing secure session...