This document provides an overview of implementing Network Access Protection (NAP). It discusses key NAP concepts like how NAP works, enforcement methods, and the NAP architecture. It also provides step-by-step demonstrations for configuring NAP including health policies, network access policies, tracing, and troubleshooting. The document concludes with a lab scenario where the reader will configure NAP components and client settings to integrate NAP into a VPN remote access solution.