Objects are the elements that enable you to construct, schedule, and search for policy rules, and Security Profiles provide threat protection in policy rules.
This section describes how to configure the Security Profiles and objects that you can use with Policies:
- Move,Clone,Override,or Revert Objects
- Objects>GlobalProtect> HIP Objects
- Objects>GlobalProtect> HIP Profiles
- Objects>ExternalDynamic Lists
- Objects>SecurityProfiles > GTP Protection
- Objects > Security Profiles > SCTP Protection
- Objects>SecurityProfile Groups
Objects > GlobalProtect > HIP Objects
Objects > GlobalProtect > HIP Objects Select Objects GlobalProtect HIP Objects to define objects for a host information profile (HIP). HIP objects provide the matching ...
Objects > Security Profiles
Objects > Security Profiles Security profiles provide threat protection in Security Policy. Each Security policy rule can include one or more Security Profiles. The following ...
How Does the Gateway Use the Host Information to Enforce Policy?
How Does the Gateway Use the Host Information to Enforce Policy? While the app gets the information about what information to collect from the client ...
Objects > GlobalProtect > HIP Profiles
Objects > GlobalProtect > HIP Profiles Select Objects GlobalProtect HIP Profiles to create the HIP profiles—a collection of HIP objects to be evaluated together either ...
How Do I Get Visibility into the State of the Endpoints?
How Do I Get Visibility into the State of the Endpoints? Whenever an endpoint connects to GlobalProtect, the app presents its HIP data to the ...
Objects > Security Profile Groups
Objects > Security Profile Groups The firewall supports the ability to create Security Profile groups , which specify sets of Security Profiles that can be ...
Provide Granular Access to the Objects Tab
Provide Granular Access to the Objects Tab An object is a container that groups specific policy filter values—such as IP addresses, URLs, applications, or services—for ...
How Do Users Know if Their Systems are Compliant?
How Do Users Know if Their Systems are Compliant? By default, end users are not given any information about policy decisions that were made as ...
Configure HIP-Based Policy Enforcement
Configure HIP-Based Policy Enforcement To enable the use of host information in policy enforcement, you must complete the following steps. For more information on the ...