GlobalProtect
GlobalProtect App 6.2.1 Windows and macOS Addressed Issues
Table of Contents
Expand All
|
Collapse All
GlobalProtect Docs
-
10.1 & Later
- 10.1 & Later
- 9.1 (EoL)
-
- How Does the App Know Which Certificate to Supply?
- Set Up Cloud Identity Engine Authentication
- Configure GlobalProtect to Facilitate Multi-Factor Authentication Notifications
- Enable Delivery of VSAs to a RADIUS Server
- Enable Group Mapping
-
-
- GlobalProtect App Minimum Hardware Requirements
- Download the GlobalProtect App Software Package for Hosting on the Portal
- Host App Updates on the Portal
- Host App Updates on a Web Server
- Test the App Installation
- Download and Install the GlobalProtect Mobile App
- View and Collect GlobalProtect App Logs
-
-
- Deploy App Settings in the Windows Registry
- Deploy App Settings from Msiexec
- Deploy Scripts Using the Windows Registry
- Deploy Scripts Using Msiexec
- Deploy Connect Before Logon Settings in the Windows Registry
- Deploy GlobalProtect Credential Provider Settings in the Windows Registry
- SSO Wrapping for Third-Party Credential Providers on Windows Endpoints
- Enable SSO Wrapping for Third-Party Credentials with the Windows Registry
- Enable SSO Wrapping for Third-Party Credentials with the Windows Installer
- Deploy App Settings to Linux Endpoints
- GlobalProtect Processes to be Whitelisted on EDR Deployments
-
-
- Mobile Device Management Overview
- Set Up the MDM Integration With GlobalProtect
- Qualified MDM Vendors
-
-
- Set Up the Microsoft Intune Environment for Android Endpoints
- Deploy the GlobalProtect App on Android Endpoints Using Microsoft Intune
- Create an App Configuration on Android Endpoints Using Microsoft Intune
- Configure Lockdown Mode for Always On Connect Method on Android Endpoints Using Microsoft Intune
-
- Deploy the GlobalProtect Mobile App Using Microsoft Intune
- Configure an Always On VPN Configuration for iOS Endpoints Using Microsoft Intune
- Configure a User-Initiated Remote Access VPN Configuration for iOS Endpoints Using Microsoft Intune
- Configure a Per-App VPN Configuration for iOS Endpoints Using Microsoft Intune
-
-
-
- Create a Smart Computer Group for GlobalProtect App Deployment
- Create a Single Configuration Profile for the GlobalProtect App for macOS
- Deploy the GlobalProtect Mobile App for macOS Using Jamf Pro
-
- Enable GlobalProtect System Extensions on macOS Endpoints Using Jamf Pro
- Enable GlobalProtect Network Extensions on macOS Big Sur Endpoints Using Jamf Pro
- Add a Configuration Profile for the GlobalProtect Enforcer by Using Jamf Pro 10.26.0
- Verify Configuration Profiles Deployed by Jamf Pro
- Remove System Extensions on macOS Monterey Endpoints Using Jamf Pro
- Non-Removable System Extensions on macOS Sequoia Endpoints Using Jamf Pro
- Uninstall the GlobalProtect Mobile App Using Jamf Pro
-
- Configure HIP-Based Policy Enforcement
- Configure HIP Exceptions for Patch Management
- Collect Application and Process Data From Endpoints
- Redistribute HIP Reports
-
- Identification and Quarantine of Compromised Devices Overview and License Requirements
- View Quarantined Device Information
- Manually Add and Delete Devices From the Quarantine List
- Automatically Quarantine a Device
- Use GlobalProtect and Security Policies to Block Access to Quarantined Devices
- Redistribute Device Quarantine Information from Panorama
- Troubleshoot HIP Issues
-
-
- Enable and Verify FIPS-CC Mode on Windows Endpoints
- Enable and Verify FIPS-CC Mode on macOS Endpoints
- Enable and Verify FIPS-CC Mode Using Workspace ONE on iOS Endpoints
- Enable FIPS Mode on Linux EndPoints with Ubuntu or RHEL
- Enable and Verify FIPS-CC Mode Using Microsoft Intune on Android Endpoints
- FIPS-CC Security Functions
- Resolve FIPS-CC Mode Issues
-
-
- Remote Access VPN (Authentication Profile)
- Remote Access VPN (Certificate Profile)
- Remote Access VPN with Two-Factor Authentication
- GlobalProtect Always On VPN Configuration
- Remote Access VPN with Pre-Logon
- User-Initiated Pre-Logon Connection
- GlobalProtect Multiple Gateway Configuration
- GlobalProtect for Internal HIP Checking and User-Based Access
- Mixed Internal and External Gateway Configuration
- Captive Portal and Enforce GlobalProtect for Network Access
- GlobalProtect on Windows 365 Cloud PC
-
- About GlobalProtect Cipher Selection
- Cipher Exchange Between the GlobalProtect App and Gateway
-
- Reference: GlobalProtect App Cryptographic Functions
-
- Reference: TLS Ciphers Supported by GlobalProtect Apps on macOS Endpoints
- Reference: TLS Ciphers Supported by GlobalProtect Apps on Windows Endpoints
- Reference: TLS Ciphers Supported by GlobalProtect Apps on Android 6.0.1 Endpoints
- Reference: TLS Ciphers Supported by GlobalProtect Apps on iOS 10.2.1 Endpoints
- Reference: TLS Ciphers Supported by GlobalProtect Apps on Chromebooks
- Ciphers Used to Set Up IPsec Tunnels
- SSL APIs
-
- View a Graphical Display of GlobalProtect User Activity in PAN-OS
- View All GlobalProtect Logs on a Dedicated Page in PAN-OS
- Event Descriptions for the GlobalProtect Logs in PAN-OS
- Filter GlobalProtect Logs for Gateway Latency in PAN-OS
- Restrict Access to GlobalProtect Logs in PAN-OS
- Forward GlobalProtect Logs to an External Service in PAN-OS
- Configure Custom Reports for GlobalProtect in PAN-OS
-
6.3
- 6.3
- 6.2
- 6.1
- 6.0
- 5.1
-
- Download and Install the GlobalProtect App for Windows
- Use Connect Before Logon
- Use Single Sign-On for Smart Card Authentication
- Use the GlobalProtect App for Windows
- Report an Issue From the GlobalProtect App for Windows
- Disconnect the GlobalProtect App for Windows
- Uninstall the GlobalProtect App for Windows
- Fix a Microsoft Installer Conflict
-
- Download and Install the GlobalProtect App for macOS
- Use the GlobalProtect App for macOS
- Report an Issue From the GlobalProtect App for macOS
- Disconnect the GlobalProtect App for macOS
- Uninstall the GlobalProtect App for macOS
- Remove the GlobalProtect Enforcer Kernel Extension
- Enable the GlobalProtect App for macOS to Use Client Certificates for Authentication
-
6.1
- 6.1
- 6.0
- 5.1
-
6.2
- 6.3
- 6.2
- 6.1
- 6.0
- 5.1
- Features Introduced
- Changes to Default Behavior
- Associated Software and Content Versions
-
- GlobalProtect App 6.2.8 Windows and macOS Known Issues
- GlobalProtect App 6.2.7 Windows and macOS Known Issues
- GlobalProtect App 6.2.6-c857 Windows and macOS Known Issues
- GlobalProtect App 6.2.1-c31 Linux Known Issues
- GlobalProtect App 6.2.6 Windows and macOS Known Issues
- GlobalProtect App 6.2.5 Windows and macOS Known Issues
- GlobalProtect App 6.2.4 Windows and macOS Known Issues
- GlobalProtect App 6.2.3-c287 Windows and macOS Known Issues
- GlobalProtect App 6.2.3 Windows and macOS Known Issues
- GlobalProtect App 6.2.2 Windows and macOS Known Issues
- GlobalProtect App 6.2.1 Linux Known Issues
- GlobalProtect App 6.2.1 Windows and macOS Known Issues
- GlobalProtect App 6.2.0 Linux Known Issues
-
- GlobalProtect App 6.2.8 Windows and macOS Addressed Issues
- GlobalProtect App 6.2.7 Addressed Issues
- GlobalProtect App 6.2.6-c857 Windows and macOS Addressed Issues
- GlobalProtect App 6.2.1-c31 Linux Addressed Issues
- GlobalProtect App 6.2.6 Windows and macOS Addressed Issues
- GlobalProtect App 6.2.5 Windows and macOS Addressed Issues
- GlobalProtect App 6.2.4 Windows and macOS Addressed Issues
- GlobalProtect App 6.2.3-c287 Addressed Issues
- GlobalProtect App 6.2.3 Windows and macOS Addressed Issues
- GlobalProtect App 6.2.2 Windows and macOS Addressed Issues
- GlobalProtect App 6.2.1 Linux Addressed Issues
- GlobalProtect App 6.2.1 Windows and macOS Addressed Issues
- GlobalProtect App 6.2.0 Linux Addressed Issues
GlobalProtect App 6.2.1 Windows and macOS Addressed Issues
GlobalProtect App 6.2.1 Windows and macOS Addressed Issues
The following table lists the issues that are addressed in GlobalProtect app 6.2.1 for
Windows and macOS.
Issue ID | Description |
---|---|
GPC-18789
|
Fixed an issue where the GlobalProtect app took a long time to
connect to the gateway when the include domain list was used, while
the enhanced split-tunnel feature was not used.
|
GPC-18788
|
Fixed an issue where the GlobalProtect HIP check did not detect
McAfee Total Protection as an anti-malware application, which caused
the device to fail the HIP check.
|
GPC-18594
|
Fixed an issue where the GlobalProtect app was unable to send HIP
reports when the app was connected using IPv6.
|
GPC-18566
|
Fixed an issue where the GlobalProtect app incorrectly displayed the
gateway as internal when it was connected to an external
gateway.
|
GPC-18528
|
Fixed an issue where the GlobalProtect HIP check incorrectly detected
the version for KES 12 (Kaspersky Endpoint Security), which caused
the device to fail the HIP check.
|
GPC-18509
|
Fixed an issue where, when the GlobalProtect app was configured with
the Internal Host Detection and Conditional Connect method, the app
did not connect to the internal network when the network was changed
from external to internal as it should have with the Conditional
Connect method enabled.
|
GPC-18452
|
Fixed an issue where, when the GlobalProtect app was installed on
Windows devices the app did not start right away after a system
reboot.
|
GPC-18426
|
Fixed an issue where when the GlobalProtect app was configured with
the Disable GlobalProtect set to
Allow with Ticket, the app did not
display the correct Disable Duration time.
|
GPC-18336
|
Fixed an issue where the GlobalProtect app got automatically
connected after a system reboot even though the connection method
configured was On-Demand.
|
GPC-18318
|
Fixed an issue where, when the GlobalProtect app was connected to the
internal gateway, the app displayed the message as
Connected - Inter.... instead of
Connected - Internal.
|
GPC-18281
|
Fixed an issue where the MSI install logs showed mutiple messages for
Autonomous DEM installation.
|
GPC-18251
|
Fixed an issue where the GlobalProtect HIP check did not detect
McAfee LiveSafe as an anti-malware application, which caused the
device to fail the HIP check.
|
GPC-18230
|
Fixed an issue where, when the user entered credentials during SAML
authentication after the set internal login timer, the app displayed
an authentication failed message without providing the reason. The
Retry button on the app web interface did
not work properly when using an embedded browser for authentication.
The Retry button was not fully visible on the
embedded browser.
|
GPC-18175
|
Fixed an issue where users were prompted to enter their credentials
even when the GlobalProtect app was configured for authenticating
with either Authentication Profile /Cookie or Client
Certificate.
|
GPC-18173
|
Fixed an issue where the vertical scroll bar on the GlobalProtect app
web interface did not work properly when users tried to select the
certificate from the drop-down.
|
GPC-18171
|
Fixed an issue where users were unable to select the external gateway
manually when connected to the internal network. The GlobalProtect
stayed in Connecting state and users
had to manually disconnect the connection and connect to the
internal network to exit the Connecting
state.
|
GPC-18167
|
Fixed an issue where the GlobalProtect app displayed the Prisma
Access gateways that are not set for manual selection.
|
GPC-18146
|
Fixed an issue where, when the GlobalProtect app was installed on
Windows devices, the GlobalProtect HIP check did not detect the
correct details for Cortex XDR, which caused the device to fail the
HIP check.
|
GPC-18135
|
Fixed an issue where, when the GlobalProtect app was installed on
devices running macOS, the GlobalProtect HIP check detected the
WithSecure antivirus software as XProtect, which caused the device
to fail the HIP check.
|
GPC-18107
|
Fixed an issue where the GlobalProtect HIP check did not detect
McAfee LiveSafe – Internet Security, which caused the device to fail
the HIP check.
|
GPC-18092
|
Fixed an issue where GlobalProtect connected to an internal gateway
got automatically disconnected after a certain period of time.
|
GPC-18073
|
Fixed an issue where the GlobalProtect app selected an unexpected
gateway due to a latency discrepancy seen between PanGPS and packet
capture.
|
GPC-18060
|
Fixed an issue where the GlobalProtect HIP check did not detect
McAfee Total Protection, which caused the device to fail the HIP
check.
|
GPC-18036
|
Fixed an issue where, when the No direct access to local
network option was enabled on the GlobalProtect app
with access routes excluded from the GlobalProtect VPN tunnel, the
feature did not work as expected when Endpoint Traffic Policy
Enforcement was enabled.
|
GPC-17936
|
Fixed an issue where the Conditional Connect method did not work as
expected and users had to manually connect the app when they changed
their network.
|
GPC-17921
|
Fixed an issue where, when the language was set to Japanese, the time
to connect was not displayed properly when Disconnect
Timeout for the app was configured.
|
GPC-17896
|
Fixed an issue where users were unable to connect to GlobalProtect
gateway when only one external gateway was added due to the
following error: Cannot Verify Server Certificate of
Gateway.
|
GPC-17795
|
Fixed an issue where the GlobalProtect HIP check did not detect the
Xcitium Enterprise, the Endpoint Protection Platform by COMODO,
which caused the device to fail the HIP check.
|
GPC-17776
|
Fixed an issue where, when the GlobalProtect app was installed on
devices running macOS and GlobalProtect enforcer was configured with
allowed FQDNs, users were still able to access the internet and
other public domains.
|
GPC-17762
|
Fixed an issue when the GlobalProtect app was configured with the
option Allow User to Disable GlobalProtect
App with comment, the option did not work as
expected.
|
GPC-17748
|
Fixed an issue where the GlobalProtect HIP check did not detect the
Real-Time Protection status correctly for the CrowdStrike Falcon
application, which caused the device to fail the HIP check.
|
GPC-17740
|
Fixed an issue where, when the GlobalProtect app was connected
through the Prisma Access gateway, the upload speed of the internet
was reduced to 2 Mbps.
|
GPC-17728
|
Fixed an issue where users were unable to connect to GlobalProtect
gateway when only one external gateway was added due to the
following error: Cannot Verify Server Certificate of
Gateway.
|
GPC-17460
|
Fixed an issue where, when the GlobalProtect app was installed on
Windows 10 or 11 devices, and when the user tried to authenticate
using SAML authentication, the app did not display the
Term of Use pop-up on the
Welcome page properly.
|
GPC-17398
|
Fixed an issue where the GlobalProtect app SettingsConnection tab did not display the Assigned IP
Address(es) and Gateway IP
Address properly.
|
GPC-17206
|
Fixed an issue where, when Internal Host Detection (IHD) was enabled
but failed to detect the internal network properly, the app failed
to switch to the external gateway when users switched from an
internal network to an external network.
|
GPC-17161
|
Fixed an issue where, when the GlobalProtect app was installed on
devices running macOS, the GlobalProtect app failed to reconnect and
continued to stay in the Connecting state
after the device woke up from Modern Standby mode.
|
GPC-17099
|
When the GlobalProtect app for Windows is upgraded to version 6.0.5,
devices with Driver Verifier enabled and configured to monitor the
PAN virtual adapter driver (pangpd.sys) display the
DRIVER_VERIFIER_DETECTED_VIOLATION Blue Screen error.
|
GPC-17001
|
Fixed an issue where, when the GlobalProtect app was installed on
devices running on macOS, the app did not display the
Connect button and Refresh
Connection button properly.
|
GPC-16978
|
Fixed an issue where the GlobalProtect app took a long time to
establish a connection due to an erroneous packet capture
process.
|
GPC-16851
|
Fixed an issue where, when the GlobalProtect app was installed on
devices running macOS, the app did not try to auto-connect to the
gateway after exceeding the Disable Timeout
Value.
|
GPC-16397
|
Fixed an issue where the GlobalProtect app was installed on devices
running macOS, a blank GlobalProtect app user interface was
displayed instead of the correct page.
|
GPC-16126
|
Fixed an issue where the GlobalProtect app did not display the
certificate name in the Client Certificate selection field
properly.
|
GPC-16003
|
Fixed an issue where, when the GlobalProtect app was installed on
devices running macOS, the app was not connected when the proxy was
configured for Safari or Chrome.
|
GPC-15968
|
Fixed an issue where the GlobalProtect app was stuck in
Connecting state when users failed to
authenticate with SAML and using an embedded browser. Users were
unable to disconnect the app and had to reboot the device.
|
GPC-15262
|
Fixed an issue where when single sign-on (SSO) for Smart Cards was
used for authentication, users were prompted to enter a PIN instead
of a password on the Windows login screen.
|
GPC-15234
|
Fixed an issue where the app would get stuck at Connecting state
while trying to connect to a gateway.
|
GPC-15080
|
Fixed an issue where when the split tunnel was configured based on
the destination domain, split tunneling did not work as expected
when IPv6 traffic exclusion was configured.
|