<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Global Protect HIP Check and AD Computer Account in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-hip-check-and-ad-computer-account/m-p/550288#M4227</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;The most secure way of checking this I using certificates, checking if the connecting client is using a certificate distributed by your companies PKI.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/globalprotect/9-1/globalprotect-admin/authentication/set-up-client-certificate-authentication" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/globalprotect/9-1/globalprotect-admin/authentication/set-up-client-certificate-authentication&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;You can even deploy separate certificates per device type using extended key usage and check on the specific OID. (Microsot PKI)&lt;/P&gt;
&lt;P&gt;On top of the client cert user or machine cert you add SAML/LDAP/RADIUS authentication.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Or you can do the check for allowed on you authentication backend RADIUS (NPS/ISE). &amp;nbsp;But this will not disallow users from connecting to portal and trying to authenticate on it. &amp;nbsp;Can only be achieved with certificates. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 20 Jul 2023 22:43:04 GMT</pubDate>
    <dc:creator>GOMEZZZ</dc:creator>
    <dc:date>2023-07-20T22:43:04Z</dc:date>
    <item>
      <title>Global Protect HIP Check and AD Computer Account</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-hip-check-and-ad-computer-account/m-p/548908#M4200</link>
      <description>&lt;DIV style="width: 100%;"&gt;
&lt;P class="-Zro6 -ZADH IjV6v AnCKd _57WYp"&gt;&lt;SPAN class="d0767"&gt;&lt;SPAN&gt;Hello,&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV id="viewer-9ond84035" class="-Zro6 -ZADH IjV6v _57WYp"&gt;&lt;SPAN class="d0767"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;P class="-Zro6 -ZADH IjV6v AnCKd _57WYp"&gt;&lt;SPAN class="d0767"&gt;&lt;SPAN&gt;I'm currently trying to restrict Global Protect users from logging into the Portal or Gateway with unauthorized devices.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV id="viewer-g2ndq4042" class="-Zro6 -ZADH IjV6v _57WYp"&gt;&lt;SPAN class="d0767"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;P class="-Zro6 -ZADH IjV6v AnCKd _57WYp"&gt;&lt;SPAN class="d0767"&gt;&lt;SPAN&gt;In our setup, all devices that are allowed to connect (mobile, laptops, desktops, etc.) are listed in an Active Directory OU (computer account).&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV id="viewer-rpvol4049" class="-Zro6 -ZADH IjV6v _57WYp"&gt;&lt;SPAN class="d0767"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;P class="-Zro6 -ZADH IjV6v AnCKd _57WYp"&gt;&lt;SPAN class="d0767"&gt;&lt;SPAN&gt;I have been unable to find any information on how to configure this restriction in the official documentation or through online resources.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="-Zro6 -ZADH IjV6v AnCKd _57WYp"&gt;&lt;SPAN class="d0767"&gt;&lt;SPAN&gt;Is it possible to implement this limitation?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV id="viewer-acskw4057" class="-Zro6 -ZADH IjV6v _57WYp"&gt;&lt;SPAN class="d0767"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;P class="-Zro6 -ZADH IjV6v AnCKd _57WYp"&gt;&lt;SPAN class="d0767"&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Tue, 11 Jul 2023 11:31:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-hip-check-and-ad-computer-account/m-p/548908#M4200</guid>
      <dc:creator>BusanaB</dc:creator>
      <dc:date>2023-07-11T11:31:32Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect HIP Check and AD Computer Account</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-hip-check-and-ad-computer-account/m-p/550114#M4218</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/214716"&gt;@BusanaB&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;One method you could use is to verify the domain retrieved under host info:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="TomYoung_0-1689819020181.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/51809iA8A708BEAFDD71F1/image-size/medium?v=v2&amp;amp;px=400" role="button" title="TomYoung_0-1689819020181.png" alt="TomYoung_0-1689819020181.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If the domain matches the HIP object, then it is a device in the domain.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jul 2023 02:12:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-hip-check-and-ad-computer-account/m-p/550114#M4218</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2023-07-20T02:12:47Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect HIP Check and AD Computer Account</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-hip-check-and-ad-computer-account/m-p/550288#M4227</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;The most secure way of checking this I using certificates, checking if the connecting client is using a certificate distributed by your companies PKI.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/globalprotect/9-1/globalprotect-admin/authentication/set-up-client-certificate-authentication" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/globalprotect/9-1/globalprotect-admin/authentication/set-up-client-certificate-authentication&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;You can even deploy separate certificates per device type using extended key usage and check on the specific OID. (Microsot PKI)&lt;/P&gt;
&lt;P&gt;On top of the client cert user or machine cert you add SAML/LDAP/RADIUS authentication.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Or you can do the check for allowed on you authentication backend RADIUS (NPS/ISE). &amp;nbsp;But this will not disallow users from connecting to portal and trying to authenticate on it. &amp;nbsp;Can only be achieved with certificates. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jul 2023 22:43:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-hip-check-and-ad-computer-account/m-p/550288#M4227</guid>
      <dc:creator>GOMEZZZ</dc:creator>
      <dc:date>2023-07-20T22:43:04Z</dc:date>
    </item>
  </channel>
</rss>

