GlobalProtect Portals Agent Config Selection Criteria Tab
Table of Contents
Expand all | Collapse all
-
- Firewall Overview
- Features and Benefits
- Last Login Time and Failed Login Attempts
- Message of the Day
- Task Manager
- Language
- Alarms
- Commit Changes
- Save Candidate Configurations
- Revert Changes
- Lock Configurations
- Global Find
- Threat Details
- AutoFocus Intelligence Summary
- Configuration Table Export
- Change Boot Mode
-
- Objects > Addresses
- Objects > Address Groups
- Objects > Regions
- Objects > Dynamic User Groups
- Objects > Application Groups
- Objects > Application Filters
- Objects > Services
- Objects > Service Groups
- Objects > Devices
- Objects > External Dynamic Lists
- Objects > Custom Objects > Spyware/Vulnerability
- Objects > Custom Objects > URL Category
- Objects > Security Profiles > Antivirus
- Objects > Security Profiles > Anti-Spyware Profile
- Objects > Security Profiles > Vulnerability Protection
- Objects > Security Profiles > File Blocking
- Objects > Security Profiles > WildFire Analysis
- Objects > Security Profiles > Data Filtering
- Objects > Security Profiles > DoS Protection
- Objects > Security Profiles > Mobile Network Protection
- Objects > Security Profiles > SCTP Protection
- Objects > Security Profile Groups
- Objects > Log Forwarding
- Objects > Authentication
- Objects > Packet Broker Profile
- Objects > Schedules
-
-
- Firewall Interfaces Overview
- Common Building Blocks for Firewall Interfaces
- Common Building Blocks for PA-7000 Series Firewall Interfaces
- Tap Interface
- HA Interface
- Virtual Wire Interface
- Virtual Wire Subinterface
- PA-7000 Series Layer 2 Interface
- PA-7000 Series Layer 2 Subinterface
- PA-7000 Series Layer 3 Interface
- Layer 3 Interface
- Layer 3 Subinterface
- Log Card Interface
- Log Card Subinterface
- Decrypt Mirror Interface
- Aggregate Ethernet (AE) Interface Group
- Aggregate Ethernet (AE) Interface
- Network > Interfaces > VLAN
- Network > Interfaces > Loopback
- Network > Interfaces > Tunnel
- Network > Interfaces > SD-WAN
- Network > VLANs
- Network > Virtual Wires
-
- Network > Network Profiles > GlobalProtect IPSec Crypto
- Network > Network Profiles > IPSec Crypto
- Network > Network Profiles > IKE Crypto
- Network > Network Profiles > Monitor
- Network > Network Profiles > Interface Mgmt
- Network > Network Profiles > QoS
- Network > Network Profiles > LLDP Profile
- Network > Network Profiles > SD-WAN Interface Profile
-
-
- Device > Setup
- Device > Setup > Management
- Device > Setup > Interfaces
- Device > Setup > Telemetry
- Device > Setup > Content-ID
- Device > Setup > WildFire
- Device Setup Ace
- Device > Setup > DLP
- Device > Log Forwarding Card
- Device > Config Audit
- Device > Administrators
- Device > Admin Roles
- Device > Access Domain
- Device > Authentication Sequence
- Device > Device Quarantine
-
- Security Policy Match
- QoS Policy Match
- Authentication Policy Match
- Decryption/SSL Policy Match
- NAT Policy Match
- Policy Based Forwarding Policy Match
- DoS Policy Match
- Routing
- Test Wildfire
- Threat Vault
- Ping
- Trace Route
- Log Collector Connectivity
- External Dynamic List
- Update Server
- Test Cloud Logging Service Status
- Test Cloud GP Service Status
- Device > Virtual Systems
- Device > Shared Gateways
- Device > Certificate Management
- Device > Certificate Management > Certificate Profile
- Device > Certificate Management > OCSP Responder
- Device > Certificate Management > SSL/TLS Service Profile
- Device > Certificate Management > SCEP
- Device > Certificate Management > SSL Decryption Exclusion
- Device > Certificate Management > SSH Service Profile
- Device > Response Pages
- Device > Server Profiles
- Device > Server Profiles > SNMP Trap
- Device > Server Profiles > Syslog
- Device > Server Profiles > Email
- Device > Server Profiles > HTTP
- Device > Server Profiles > NetFlow
- Device > Server Profiles > RADIUS
- Device > Server Profiles > TACACS+
- Device > Server Profiles > LDAP
- Device > Server Profiles > Kerberos
- Device > Server Profiles > SAML Identity Provider
- Device > Server Profiles > DNS
- Device > Server Profiles > Multi Factor Authentication
- Device > Local User Database > Users
- Device > Local User Database > User Groups
- Device > Scheduled Log Export
- Device > Software
- Device > Dynamic Updates
- Device > Licenses
- Device > Support
- Device > Policy Recommendation > IoT
- Device > Policy > Recommendation SaaS
-
- Network > GlobalProtect > MDM
- Network > GlobalProtect > Clientless Apps
- Network > GlobalProtect > Clientless App Groups
- Objects > GlobalProtect > HIP Profiles
-
- Use the Panorama Web Interface
- Context Switch
- Panorama Commit Operations
- Defining Policies on Panorama
- Log Storage Partitions for a Panorama Virtual Appliance in Legacy Mode
- Panorama > Setup > Interfaces
- Panorama > High Availability
- Panorama > Administrators
- Panorama > Admin Roles
- Panorama > Access Domains
- Panorama > Device Groups
- Panorama > Plugins
- Panorama > Log Ingestion Profile
- Panorama > Log Settings
- Panorama > Server Profiles > SCP
- Panorama > Scheduled Config Export
- Panorama > Device Registration Auth Key
GlobalProtect Portals Agent Config Selection Criteria Tab
- NetworkGlobalProtectPortals<portal-config>Agent<agent-config>Config Selection Criteria
Select the Config Selection Criteria tab
to configure the matching criteria used to identify the endpoint
type in deployments with both managed and unmanaged endpoints. The
portal can push specified configurations to the endpoint based on
the endpoint type.
GlobalProtect Portal
Config Selection Criteria Settings | Description |
---|---|
User/User Group tab | |
OS | Add one or more endpoint
operating system (OS) to specify which endpoints receive this configuration.
The portal automatically learns the OS of the endpoint and incorporates
details for that OS in the client configuration. You can select Any OS
or a specific OS (Android, Chrome, iOS, IoT, Linux, Mac, Windows,
or WindowsUWP). |
User/User Group | Add the specific users
or user groups to which this configuration applies. You
must configure group mapping (DeviceUser IdentificationGroup Mapping Settings)
before you can select user groups. To deploy this configuration
to all users, select any from the User/User
Group drop-down. To deploy this configuration only to users
with GlobalProtect apps in pre-logon mode, select pre-logon from
the User/User Group drop-down. |
Device Checks | |
Machine account exists with device serial number | Configure matching criteria based on whether
the endpoint serial number exists in the Active Directory. The serial
number check is supported on Windows and Mac operating systems. |
Certificate Profile | Select the certificate profile that the GlobalProtect
portal uses to match the machine certificate sent by the GlobalProtect
app. The machine certificate check is supported on Windows and Mac
operating systems. |
Custom Checks | |
Custom Checks | Select this option to define custom host information
to match. |
Registry Key | To check Windows endpoints for a specific
registry key, Add the Registry
Key for which to match. To match only the endpoints that
lack the specified registry key or key value, enable the Key
does not exist or match the specified value data option.
To match on specific values, Add the Registry
Value and Value Data. To match endpoints
that do not have the specified registry value, select Negate.When
you select the Negate option, you must leave
the Value Data field empty.You can select
the Negate option for a Registry Value in
Custom Checks in the GlobalProtect Portal that does not have the specified
registry value (matching the absence of registry value). If
you configure a registry value with the Negate option
and leave the Value Data field empty, the Negate works
on the registry value.Negate option and Value Data match
are mutually exclusive and you cannot configure Value Data and Negate option together. |
Plist | To check macOS endpoints for a specific entry
in the property list (plist), Add the Plist name.
To match only the endpoints that do not have the specified plist,
enable the Plist does not exist option. To
match on specific key-value pairs within the plist, Add the Key and corresponding Value. To
match endpoints that explicitly do not have the specified key or
value, select Negate. |