Combine HIP objects to
build a HIP profile. Think of HIP profiles as
security posture
checklists against which your hosts are evaluated, and each
HIP object is one item on the list. You can grant hosts access to
your network or to sensitive resources based on their security posture
compliance.
To add or edit a HIP profile, go to .
Learn more about addresses
and other objects that you can create to use as policy building
blocks.