HIP Objects Custom Checks Tab
- ObjectsGlobalProtectHIP Objects<hip-object>Custom Checks
Select the Custom Checks tab to enable HIP matching on any custom checks you have defined on the GlobalProtect portal. For details on adding the custom checks to the HIP collection, see Network > GlobalProtect > Portals.
HIP Object Custom Checks Settings
Select Custom Checks to enable matching on custom checks you defined on the GlobalProtect portal.
To check the host system for a specific process, click Add and then enter the process name. By default, the app checks for running processes; if you want to see if a specific process is not running, clear the Running selection. Processes can be operating system level processes or user-space application processes.
To check Windows hosts for a specific registry key, click Add and enter the Registry Key to match. To match only the hosts that lack the specified registry key or the key’s value, mark the Key does not exist or match the specified value data box.
To match on specific values, click Add and then enter the Registry Value and Value Data. To match hosts that explicitly do not have the specified value or value data, select Negate.
Click OK to save the settings.
To check Mac hosts for a specific entry in the property list (plist), click Add and enter the Plist name. To match only the hosts that do not have the specified plist, select Plist does not exist.
To match on specific key-value pair within the plist, click Add and then enter the Key and the corresponding Value to match. To match hosts that explicitly do not have the specified key or value, select Negate.
Click OK to save the settings.
Collect Application and Process Data From Endpoints
Collect Application and Process Data From Endpoints The Windows Registry and macOS plist can be used to configure and store settings for Windows and Mac ...
Agent Configurations Based on Software and App Settings
Agent Configurations Based on Software and App Settings Use the following steps to push agent configurations to connecting endpoints based on the presence of specific ...
HIP-Based Policy Enforcement Based on the Endpoint Status
HIP-Based Policy Enforcement Based on the Endpoint Status Use the following steps to enforce HIP-based security policies based on the status of connecting endpoints: To ...
GlobalProtect Portals Agent Config Selection Criteria Tab
GlobalProtect Portals Agent Config Selection Criteria Tab Network GlobalProtect Portals Agent Config Selection Criteria Select the Config Selection Criteria tab to configure the matching criteria ...
GlobalProtect Portals Agent Data Collection Tab
GlobalProtect Portals Agent HIP Data Collection Tab Network GlobalProtect Portals Agent HIP Data Collection Select the HIP Data Collection tab to define the data that ...
Configure HIP-Based Policy Enforcement
Configure HIP-Based Policy Enforcement To enable the use of host information in policy enforcement, you must complete the following steps. For more information on the ...
Define the GlobalProtect Agent Configurations
Define the GlobalProtect Agent Configurations After a GlobalProtect user connects to the portal and is authenticated by the GlobalProtect portal, the portal sends the agent ...
Deploy App Settings in the Mac Plist
Deploy App Settings in the macOS Plist You can set the GlobalProtect app customization settings in the macOS global plist (Property list) file. This enables ...
What Data Does the GlobalProtect App Collect?
What Data Does the GlobalProtect App Collect? By default, the GlobalProtect app collects vendor-specific data about the end user security packages that are running on ...