End-of-Life (EoL)
Configure HIP-Based Policy Enforcement
To enable the use of host information in policy
enforcement you must complete the following steps. For more information
on the HIP feature, see About
Host Information.
- Verify proper licensing for HIP checks.To use the HIP feature, you must have purchased and installed a GlobalProtect subscription license on each gateway that will perform HIP checks. To verify the status of your licenses on each portal and gateway, select.DeviceLicensesContact your Palo Alto Networks Sales Engineer or Reseller if you do not have the required licenses. For more information on licensing, see About GlobalProtect Licenses.
- (Optional) Define any custom host information that you want the agent to collect. For example, if you have any required applications that are not included in the Vendor and/or Product lists for creating HIP objects, you could create a custom check that will allow you to determine whether that application is installed (has a corresponding registry or plist key) or is running (has a corresponding running process).2 and 3 assume that you have already created a Portal Configuration. If you have not yet configured your portal, see Set Up Access to the GlobalProtect Portal for instructions.
- On the firewall that is hosting your GlobalProtect portal, select.NetworkGlobalProtectPortals
- Select your portal configuration to open the GlobalProtect Portal dialog.
- Select theAgenttab and then select the agent configuration to which you want to add a custom HIP check, or clickAddto create a new agent configuration.
- Select theData Collectiontab.
- Enable the option toCollect HIP Data.
- SelectCustom Checksand define the data you want to collect from hosts running this agent configuration as follows:
- To collect information about specific registry keys: On theWindowstab,Addthe name of aRegistry Keyfor which to collect data in the Registry Key area. Optionally, to restrict data collection to a specific Registry Value,Addand then define the specific Registry Value or values. ClickOKto save the settings.
- To collect information about running processes: Select the appropriate tab (WindowsorMac) and thenAdda process to the Process List. Enter the name of the process that you want the agent to collect information about.
- To collect information about specific property lists: On theMactab, clickAddin the Plist section. Enter thePlistfor which to collect data. Optionally, clickAddto restrict the data collection to specificKeyvalues. ClickOKto save the settings.
- If this is a new client configuration, complete the rest of the configuration as desired. For instructions, see Define the GlobalProtect Agent Configurations.
- ClickOKto save the client configuration.
- Committhe changes.
- (Optional) Exclude categories from collection.
- On the firewall that is hosting your GlobalProtect portal, select.NetworkGlobalProtectPortals
- Select your portal configuration to open the GlobalProtect Portal dialog.
- On theAgenttab, select the Agent configuration from which to exclude categories, orAdda new one.
- SelectData Collection, and then verify thatCollect HIP Datais enabled.
- On theExclude Categoriestab, clickAdd. The Edit Exclude Category dialog displays.
- Select theCategoryyou want to exclude from the drop-down list.
- (Optional) If you want to exclude specific vendors and/or products from collection within the selected category rather than excluding the entire category, clickAdd. You can then select theVendorto exclude from the drop-down on the Edit Vendor dialog and, optionally, clickAddto exclude specific products from that vendor. When you are done defining that vendor, clickOK. You can add multiple vendors and products to the exclude list.
- If this is a new client configuration, complete the rest of the configuration as desired. For more information on defining client configurations, see Define the GlobalProtect Agent Configurations.
- ClickOKto save the client configuration.
- Committhe changes.
- Create the HIP objects to filter the raw host data collected by the agents.The best way to determine what HIP objects you need is to determine how you will use the host information you collect to enforce policy. Keep in mind that the HIP objects themselves are merely building blocks that allow you to create the HIP profiles that are used in your security policies. Therefore, you may want to keep your objects simple, matching on one thing, such as the presence of a particular type of required software, membership in a specific domain, or the presence of a specific client OS. By doing this, you will have the flexibility to create a very granular (and very powerful) HIP-augmented policy.For details on a specific HIP category or field, refer to the online help.
- On the gateway (or on Panorama if you plan to share the HIP objects among multiple gateways), selectand clickObjectsGlobalProtectHIP ObjectsAdd.
- On theGeneraltab, enter aNamefor the object.
- Select the tab that corresponds to the category of host information you are interested in matching against and select the check box to enable the object to match against the category. For example, to create an object that looks for information about Antivirus software, select theAntivirustab and then select theAntiviruscheck box to enable the corresponding fields. Complete the fields to define the desired matching criteria. For example, the following screenshot shows how to create an object that will match if the Symantec Norton AntiVirus 2004 Professional application is installed, has Real Time Protection enabled, and has virus definitions that have been updated within the last 5 days.Repeat this step for each category you want to match against in this object. For more information, see Table: Data Collection Categories.
- ClickOKto save the HIP object.
- Repeat these steps to create each additional HIP object you require.
- Committhe changes.
- Create the HIP profiles that you plan to use in your policies.When you create your HIP profiles, you can combine the HIP objects you previously created (as well as other HIP profiles) using Boolean logic such that when a traffic flow is evaluated against the resulting HIP profile it will either match or not match. If there is a match, the corresponding policy rule will be enforced; if there is not a match, the flow will be evaluated against the next rule, as with any other policy matching criteria.
- On the gateway (or on Panorama if you plan to share the HIP profiles among multiple gateways), selectand clickObjectsGlobalProtectHIP ProfilesAdd.
- Enter a descriptiveNamefor the profile and optionally aDescription.
- ClickAdd Match Criteriato open the HIP Objects/Profiles Builder.
- Select the first HIP object or profile you want to use as match criteria and then click add
to move it over to the
Matchtext box on the HIP Profile dialog. Keep in mind that if you want the HIP profile to evaluate the object as a match only when the criteria in the object is not true for a flow, select theNOTcheck box before adding the object. - Continue adding match criteria as appropriate for the profile you are building, making sure to select the appropriate Boolean operator radio button (ANDorOR) between each addition (and, again, using theNOTcheck box when appropriate).
- If you are creating a complex Boolean expression, you must manually add the parenthesis in the proper places in theMatchtext box to ensure that the HIP profile is evaluated using the logic you intend. For example, the following HIP profile will match traffic from a host that has either FileVault disk encryption (for Mac OS systems) or TrueCrypt disk encryption (for Windows systems) and also belongs to the required Domain, and has a Symantec antivirus client installed:
- When you are done adding match criteria, clickOKto save the profile.
- Repeat these steps to create each additional HIP profile you require.
- Committhe changes.
- Verify that the HIP objects and HIP profiles you created are matching your GlobalProtect client traffic as expected.Consider monitoring HIP objects and profiles as a means to monitor the security state and activity of your host endpoints. By monitoring the host information over time you will be better able to understand where your security and compliance issues are and you can use this information to guide you in creating useful policy. For more details, see How Do I Get Visibility into the State of the End Clients?On the gateway(s) that your GlobalProtect users are connecting to, select. This log shows all of the matches the gateway identified when evaluating the raw HIP data reported by the agents against the defined HIP objects and HIP profiles. Unlike other logs, a HIP match does not require a security policy match in order to be logged.MonitorLogsHIP Match
- Enable User-ID on the source zones that contain the GlobalProtect users that will be sending requests that require HIP-based access controls. You must enable User-ID even if you don’t plan on using the user identification feature or the firewall will not generate any HIP Match logs entries.
- Select.NetworkZones
- Click on theNameof the zone in which you want to enable User-ID to open the Zone dialog.
- Enable User ID by selecting theEnabledcheck box and then clickOK.
- Create the HIP-enabled security rules on your gateway(s).As a best practice, you should create your security rules and test that they match the expected flows based on the source and destination criteria as expected before adding your HIP profiles. By doing this you will also be better able to determine the proper placement of the HIP-enabled rules within the policy.
- Selectand select the rule to which you want to add a HIP profile.PoliciesSecurity
- On theUsertab, clickAddin theHIP Profilessection and select the HIP profile(s) you want to add to the rule (you can add up to 63 HIP profiles to a rule).
- ClickOKto save the rule.
- Committhe changes.
- Define the notification messages end users will see when a security rule with a HIP profile is enforced.The decision as to when to display a message (that is, whether to display it when the user’s configuration matches a HIP profile in the policy or when it doesn’t match it), depends largely on your policy and what a HIP match (or non-match) means for the user. That is, does a match mean they are granted full access to your network resources? Or does it mean they have limited access due to a non-compliance issue?For example, suppose you create a HIP profile that matches if the required corporate antivirus and anti-spyware software packages are not installed. In this case, you might want to create a HIP notification message for users who match the HIP profile telling them that they need to install the software. Alternatively, if your HIP profile matched if those same applications are installed, you might want to create the message for users who do not match the profile.
- On the firewall that is hosting your GlobalProtect gateway(s), select.NetworkGlobalProtectGateways
- Select a previously-defined gateway configuration to open the GlobalProtect Gateway dialog.
- Selectand then clickClient ConfigurationHIP NotificationAdd.
- Select theHIP Profilethis message applies to from the drop-down.
- SelectMatch MessageorNot Match Message, depending on whether you want to display the message when the corresponding HIP profile is matched in policy or when it is not matched. In some cases you might want to create messages for both a match and a non-match, depending on what objects you are matching on and what your objectives are for the policy. For the Match Message, you can also enable the option toInclude matched application list in messageto indicate what applications triggered the HIP match.
- Select theEnablecheck box and select whether you want to display the message as aPop Up Messageor as aSystem Tray Balloon.
- Enter the text of your message in the Template text box and then clickOK. The text box provides both a WYSIWYG view of the text and an HTML source view, which you can toggle between using the Source Edit
icon. The toolbar also provides many options for formatting your text and for creating hyperlinks
to external documents, for example to link users directly to the download URL for a required software program.
- Repeat this procedure for each message you want to define.
- Committhe changes.
- Verify that your HIP profiles are working as expected.You can monitor what traffic is hitting your HIP-enabled policies using the Traffic log as follows:
- From the gateway, select.MonitorLogsTraffic
- Filter the log to display only traffic that matches the rule that has the HIP profile you are interested in monitoring attached. For example, to search for traffic that matches a security rule named “iOS Apps” you would enter( rule eq 'iOS Apps' )in the filter text box as follows:
Most Popular
Recommended For You
Recommended Videos
Recommended videos not found.