Network Security
Policy Object: Quarantine Device Lists (Strata Cloud Manager)
Table of Contents
Expand All
|
Collapse All
Network Security Docs
-
- Security Policy
-
- Security Profile Groups
- Security Profile: AI Security
- Security Profile: WildFire® Analysis
- Security Profile: Antivirus
- Security Profile: Vulnerability Protection
- Security Profile: Anti-Spyware
- Security Profile: DNS Security
- Security Profile: DoS Protection Profile
- Security Profile: File Blocking
- Security Profile: URL Filtering
- Security Profile: Data Filtering
- Security Profile: Zone Protection
-
- Policy Object: Address Groups
- Policy Object: Regions
- Policy Object: Traffic Objects
- Policy Object: Applications
- Policy Object: Application Groups
- Policy Object: Application Filter
- Policy Object: Services
- Policy Object: Auto-Tag Actions
- Policy Object: Devices
-
- Uses for External Dynamic Lists in Policy
- Formatting Guidelines for an External Dynamic List
- Built-in External Dynamic Lists
- Configure Your Environment to Access an External Dynamic List
- Configure your Environment to Access an External Dynamic List from the EDL Hosting Service
- Retrieve an External Dynamic List from the Web Server
- View External Dynamic List Entries
- Enforce Policy on an External Dynamic List
- Find External Dynamic Lists That Failed Authentication
- Disable Authentication for an External Dynamic List
- Policy Object: HIP Objects
- Policy Object: Schedules
- Policy Object: Quarantine Device Lists
- Policy Object: Dynamic User Groups
- Policy Object: Custom Objects
- Policy Object: Log Forwarding
- Policy Object: Authentication
- Policy Object: Decryption Profile
- Policy Object: Packet Broker Profile
-
-
-
- The Quantum Computing Threat
- How RFC 8784 Resists Quantum Computing Threats
- How RFC 9242 and RFC 9370 Resist Quantum Computing Threats
- Support for Post-Quantum Features
- Post-Quantum Migration Planning and Preparation
- Best Practices for Resisting Post-Quantum Attacks
- Learn More About Post-Quantum Security
-
-
-
- Investigate Reasons for Decryption Failure
- Identify Weak Protocols and Cipher Suites
- Troubleshoot Version Errors
- Troubleshoot Unsupported Cipher Suites
- Identify Untrusted CA Certificates
- Repair Incomplete Certificate Chains
- Troubleshoot Pinned Certificates
- Troubleshoot Expired Certificates
- Troubleshoot Revoked Certificates
Policy Object: Quarantine Device Lists (Strata Cloud Manager)
Configure the quarantine list feature for Strata Cloud Manager Managed Prisma Access mobile user (GlobalProtect) deployments.
Prisma Access allows you to identify and quarantine compromised
devices with the GlobalProtect app. You can either manually or automatically
(based on auto-tags) add devices to a quarantine list. You can block
quarantined devices from accessing the network or restrict the device
traffic based on a security rule.
To get started, set up a
Quarantined Device List. Then use the list as part of identity redistribution.
- Set Up a Quarantined Device List
- Configure Identity Redistribution
- Use Quarantine Device List for Security Policy Enforcement
- Block Login for Quarantined Devices
Set Up a Quarantined Device List
The Quarantined Device List screen is where
you identify devices you want to block from accessing your network.
Follow
these steps to add a device to the Quarantined Device List:
- Select Manage ConfigurationNGFW and Prisma AccessObjectsQuarantined Device List.The Shared configuration scope is already selected for you. Leave this option as is.
- Select Add Device.
- Fill in the Host ID and Serial Number fields.
- Select Save.
- Repeat steps 1-4 to add additional devices.
Configure Identity Redistribution
The Identity Redistribution screen is where
you configure how identity information is redistributed in the Prisma Access Infrastructure. Configure identity redistribution to use
the quarantined device list so that all devices on the network that
enforce policy know to block the compromised devices.
Follow
these steps to configure identity redistribution to use the Quarantined Device
List you created:
- Select Manage ConfigurationNGFW and Prisma AccessIdentity ServicesIdentity Redistribution List.
- Select the appropriate configuration scope, Shared or Mobile Users.You can ignore Service Connections for now because Service connections learn from mobile users, remote networks, or external redistribution agents, as shown in the diagram. If you’re unsure about which to select, see Global and Local Policy. Shared is selected by default.
- Select Edit next to Mobile Users.
- Select the checkbox next to the Quarantined Device List.
- Select Save.Learn more about Identity Redistribution.
Block Login for Quarantined Devices
Block quarantined devices from accessing the
network, or block users from logging into the network from devices
on the Quarantined Device List.
Follow these steps to configure
Authentication Settings to prevent users from logging into GlobalProtect
from a quarantined device:
- Select WorkflowsPrisma Access SetupGlobalProtect.
- Scroll down to User Authentications and select Authentication Settings.The Authentication Settings screen appears.
- Select the checkbox for Block Login for Quarantined Devices.
- Select Save.
Use Quarantine Device List for Security Policy Enforcement
Prevent quarantined devices from sending or
receiving traffic on the network by specifying options in a security rule.
Follow these steps to configure Security Policy
to use your Quarantined Device List to prevent quarantined devices
from sending or receiving traffic on the network:
- Select Manage ConfigurationNGFW and Prisma AccessSecurity ServicesSecurity Policy from the sidebar.
- Scroll down to Security Rules and select Add Rule.The Add Security Policy Rule screen appears.
- Scroll down to DEVICES under either Source or Destination and select Match Quarantined Devices.This tells your rule to use devices in the quarantine list as the match criteria, whether you specify Quarantine as the Source Device for Source traffic or the Destination Device for Destination traffic.
- Under Action and Advanced Inspection, specify an action that blocks the quarantined device, such as Deny as required by your rule.
- Select Save.