Create and Manage HIP Profiles for the Prisma Access Agent
Learn how to create a collection of HIP objects that are evaluated
together, either for monitoring or for security policy enforcement.
Where Can I Use This?
What Do I Need?
Prisma Access (Managed by Strata Cloud Manager)
Prisma Access 5.1 Preferred or Innovation
Prisma Accesslicense with the
Mobile User subscription
Prisma Access Agent version:
25.1.0.14
macOS 14 and later or Windows 10 version 2024 and later desktop devices
Contact your Palo Alto Networks account representative to
activate the Prisma Access Agent feature
You can configure HIP Profiles from ManageConfigurationNGFW and Prisma AccessObjectsHIPHIP Profiles.
Click Add HIP Profile.
Enter a Name and Description to
identify the profile.
Click within the Match field to open the HIP Profile
builder.
Select the HIP object or profile that you want to use as match criteria
from the list.
Select a Boolean operator (And,
And). If you want the HIP Profile to evaluate
the object as a match only when the criteria in the object are not true
for a flow, select the Not check box before
adding the object.
Select another HIP object or profile to evaluate against the first HIP
object.
Continue adding match criteria for the profile that you're building, making
sure to select the appropriate Boolean operator radio button
(And or Or) between each
addition, and using the Not check box when appropriate.
The HIP Profile can contain up to 2,048 characters in length.
When creating a complex Boolean expression, you must manually add the
parenthesis in the proper places in the Match text box to
ensure that the HIP Profile is evaluated using the logic you intend.
Save and Add your HIP
Profile.
To manage your HIP Profiles, you can select an existing profile from the HIP
Notifications table or click Add in the Edit Global Agent
Settings page to open the HIP Notifications window.
From there, click Manage HIP Profile to view the list
of HIP Profiles that you have configured. You can select a HIP Profile and
Delete, Clone, or
Move it. You can also Add
a HIP Profile from here.
Create HIP-Enabled Security Rules on Your Gateways
As a best practice, you should create your security rules and test that they
match the expected flows (based on the source and destination criteria) before
adding your HIP profiles. By doing this, you can better determine the proper
placement of the HIP-enabled rules within the policy.
On the firewall that's hosting your gateway, select PoliciesSecurity, and then select the rule to which you want to add a HIP
profile.
On the Source tab, make sure the Source
Zone is a zone for which you enabled User-ID.
On the Source tab under Source
Device, Add the HIP Profiles
used to identify devices (you can add up to 63 HIP profiles to a
rule).