End-of-Life (EoL)
HIP-Based Policy Enforcement Based on the Endpoint Status
Use the following steps to enforce HIP-based
security policies based on the status of connecting endpoints:
- To identify the endpoint status and enforce HIP-based security policies based on the endpoint's machine certificate, configure a certificate profile.The GlobalProtect gateway uses this certificate profile to match the machine certificate sent by the GlobalProtect app in the HIP report. For a successful match, the machine certificate must be signed and issued by the same CA certificate and (optional) template that you configure in the certificate profile. If you do not configure a template, the machine certificate matches based on only the configured CA certificate.
- To identify the endpoint status and enforce HIP-based security policies based on the presence of the endpoint serial number, enable group mapping.If an endpoint is managed, you can bind the serial number of the endpoint to the machine account of the endpoint in your directory server (such as Active Directory). The firewall can then pre-fetch the serial numbers for these managed endpoints when it retrieves group mapping information from the directory server.In your Group Mapping configuration (), you must enable the option toDeviceUser IdentificationGroup Mapping Settings<group-mapping-config>Fetch list of managed devices. This allows the firewall to retrieve serial numbers from the directory server.
- (Optional) To identify the endpoint status and enforce HIP-based security policies based on the presence of specific software and settings, you can deploy app settings using the Windows Registry or macOS plist.The Windows Registry and macOS plist enable you to deploy app settings directly to endpoints.
- Enable the GlobalProtect app to collect HIP data from endpoints.
- To enable the GlobalProtect app to collect machine certificates from endpoints with this agent configuration, select theCertificate profilethat you configured in Step 1.
- To enable the GlobalProtect app to collect information about the software and settings that are configured on endpoints with this agent configuration, selectCustom Checksand configure any of the following options:
- Windows—AddtheRegistry Keyfor which you want to collect data. To restrict data collection to a specific value within theRegistry Key, add the correspondingRegistry Value.You can alsoAddaProcess Listto check for specific processes (software) on Windows endpoints.
- Mac—AddthePlistand correspondingKeyfor which you want to collect data.You can alsoAddaProcess Listto check for specific processes (software) on Windows endpoints.
- When you configure HIP-based policy enforcement, you can create HIP objects to match based on the status of connecting endpoints.Configure any of the following options in your HIP object to enable HIP matching based on the endpoint status:
- Configure HIP matching based on the managed status of the endpoint:You can identify the managed status of an endpoint by verifying the presence of the endpoint serial number in the Active Directory or Azure AD. If the serial number exists, the endpoint is managed. If the serial number does not exist, the endpoint is unmanaged.
- SelectGeneral.
- SelectHost Infoto enable matching based on general host information.
- Configure the HIP object to match based on theManagedstatus of the endpoint:
- If you set this option toYes, the HIP object matches only if the endpoint is managed.
- If you set this option toNo, the HIP object matches only if the endpoint is unmanaged.
- If you set this option toNone, the HIP object does not match based on theManagedstatus.
- Configure HIP matching based on a certificate profile or specific attributes in the endpoint's machine certificate:
- SelectCertificate.
- SelectValidate Certificateto enable matching based on the certificate profile and certificate attributes.
- Select theCertificate Profilethat you configured in Step 1. The GlobalProtect gateway uses this certificate profile to match the machine certificate sent by the GlobalProtect app in the HIP report.
- To match based on specific attributes in the endpoint's machine certificate,AddtheCertificate Fieldand correspondingValuein the Certificate Attributes area.
- Configure HIP matching based on the presence of specific software and settings on the endpoint:
- SelectCustom Checks.
- SelectCustom Checksto enable matching based on the presence of software and settings on the endpoint.
- To check for a specific process (software) on the endpoint, selectProcess Listand then clickAdd. When prompted, enter the process name.By default, the app checks for running processes; if you want to see if a specific process is not running, clear theRunningselection. Processes can be operating system level processes or user-space application processes.
- To check Windows endpoints for a specific registry key, selectRegistry Keyand then clickAdd. When prompted, enter theRegistry Keyand then configure any of the following options:
- To match only the endpoints that lack the specified registry key or key value, selectKey does not exist or match the specified value data.
- To match on specific registry values,AddtheRegistry Valueand correspondingValue Data. To match endpoints that do not have the specified value or value data, selectNegate.
- To check macOS endpoints for a specific plist entry, selectPlistand then clickAdd. When prompted, enter thePlistname and then configure any of the following options:
- To match only the endpoints that do not have the specified plist, selectPlist does not exist.
- To match on specific key-value pairs within the plist,Addthe plistKeyand correspondingValue. To match endpoints that do not have the specified key or value, selectNegate.
- Commityour changes.
Recommended For You
Recommended Videos
Recommended videos not found.