Decide what GlobalProtect app data (the host information profile,
or HIP, data the app collects from endpoints) that you want to use to
enforce security policy. Combine HIP objects to build a HIP profile. Think of HIP
profiles as security posture checklists again which your hosts are
evaluated, and each HIP object is one item on the list. You can grant
hosts access to your network or to sensitive resources based on their
security posture compliance. |