: HIP Profiles
Focus
Focus
Table of Contents

HIP Profiles

Combine HIP objects to build a HIP profile. Think of HIP profiles as security posture checklists against which your hosts are evaluated, and each HIP object is one item on the list. You can grant hosts access to your network or to sensitive resources based on their security posture compliance.
To add or edit a HIP profile, go to ManageConfigurationObjectsAddresses.
Learn more about addresses and other objects that you can create to use as policy building blocks.

Get started

Adding a HIP profile is one part of setting up policy enforcement based on the endpoint data the GlobalProtect app collects. Here’s a look at the complete workflow:
  1. The GlobalProtect app collects raw HIP data by default.
  2. You can also specify custom checks for the GlobalProtect app to perform on the endpoint.
    Go to ManageMobile UsersGlobalProtect AppApp Settings.
  3. Use HIP objects to specify what HIP data you want to enforce in policy.
    Go to ManageObjectsHIP Objects.
  4. Group HIP objects together in to a HIP profile. The HIP profile is like a security posture checklist for your endpoints.
    Go to ManageObjectsHIP Profile.
  5. Add your HIP profile to a security policy to evaluate and enforce endpoints based on the adherence to your security posture checklist.
    Go to Security ServicesSecurity Policy.