<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Global Protect VPN only on domain joined devices in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-vpn-only-on-domain-joined-devices/m-p/1238085#M7029</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1127726439"&gt;@R.Kniger&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;There's a lot of different ways to accomplish what you are looking for. You could make a machine certificate check against a certificate profile if you're issuing out machine certs, setup a custom check against a registry key like&amp;nbsp;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\CloudDomainJoin\TenantInfo\ to ensure that it's joined to your tenant. This is the cleanest way of accomplishing something like this since they won't be able to even connect if they don't meet your criteria since they won't match a profile.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;You could also do all of this through HIP checks and a HIP Profile so that you could drop any traffic matching a profile that indicates the machine isn't joined to your domain or associated to your Azure tenant. Unless you utilize this information in your config selection match criteria and make it so non-domain endpoints don't have a config selection, this would facilitate people connecting with a non-domain machine but you would have a "drop" rule that matches your new non-domain joined HIP profile to drop all of the traffic which matches from that endpoint.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;I'd also personally look at improving user experience a bit if you're only using issued devices and not solely using RADIUS authentication for this sort of setup. I would use a SAML connection and enable single sign on if these devices are already joined to your tenant. That way you can also utilize conditional access policies on the Entra side of things to lock this down even further.&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;</description>
    <pubDate>Tue, 16 Sep 2025 16:20:16 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2025-09-16T16:20:16Z</dc:date>
    <item>
      <title>Global Protect VPN only on domain joined devices</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-vpn-only-on-domain-joined-devices/m-p/1238083#M7028</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;we are using SCM for our NGFWs and try to connect via Global Protect.&lt;/P&gt;
&lt;P&gt;Using Radius Auth we can login with any client/os we those, but we want only domain joined device (w11,ios,ipad) to be connected via VPN.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Where we must configure SCM to look at M365 for company devices?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind regards&lt;/P&gt;</description>
      <pubDate>Tue, 16 Sep 2025 15:58:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-vpn-only-on-domain-joined-devices/m-p/1238083#M7028</guid>
      <dc:creator>R.Kniger</dc:creator>
      <dc:date>2025-09-16T15:58:23Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect VPN only on domain joined devices</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-vpn-only-on-domain-joined-devices/m-p/1238085#M7029</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1127726439"&gt;@R.Kniger&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;There's a lot of different ways to accomplish what you are looking for. You could make a machine certificate check against a certificate profile if you're issuing out machine certs, setup a custom check against a registry key like&amp;nbsp;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\CloudDomainJoin\TenantInfo\ to ensure that it's joined to your tenant. This is the cleanest way of accomplishing something like this since they won't be able to even connect if they don't meet your criteria since they won't match a profile.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;You could also do all of this through HIP checks and a HIP Profile so that you could drop any traffic matching a profile that indicates the machine isn't joined to your domain or associated to your Azure tenant. Unless you utilize this information in your config selection match criteria and make it so non-domain endpoints don't have a config selection, this would facilitate people connecting with a non-domain machine but you would have a "drop" rule that matches your new non-domain joined HIP profile to drop all of the traffic which matches from that endpoint.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;I'd also personally look at improving user experience a bit if you're only using issued devices and not solely using RADIUS authentication for this sort of setup. I would use a SAML connection and enable single sign on if these devices are already joined to your tenant. That way you can also utilize conditional access policies on the Entra side of things to lock this down even further.&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Tue, 16 Sep 2025 16:20:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-vpn-only-on-domain-joined-devices/m-p/1238085#M7029</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2025-09-16T16:20:16Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect VPN only on domain joined devices</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-vpn-only-on-domain-joined-devices/m-p/1238175#M7030</link>
      <description>&lt;P&gt;We have activate certificatprofil in the agent-app configuration, but this only stops windows client company/private to connect, iPad company/privat can connect. Or where we must set the agent app certificatprofile with our ROOT and ISSUNG CA?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Registry would only help againt Windows, at the moment we distribute the GP IP/FQDN with registry GPO&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We had a HIP rule after the GP connect rule but it wasen't used or HIT-Count dosen't grow and we don't see any HIP-Match in Monitor on the local FW.&lt;/P&gt;
&lt;P&gt;Or did we use HIP wrong?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm not really familiar with SAML, but i ask my support if he done this befor on local configurations&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind regards&lt;/P&gt;</description>
      <pubDate>Wed, 17 Sep 2025 07:14:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-vpn-only-on-domain-joined-devices/m-p/1238175#M7030</guid>
      <dc:creator>R.Kniger</dc:creator>
      <dc:date>2025-09-17T07:14:25Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect VPN only on domain joined devices</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-vpn-only-on-domain-joined-devices/m-p/1238194#M7032</link>
      <description>&lt;P&gt;We have found the first issue, Radius Auth was in "user OR client zertifikat" mode not both.&lt;/P&gt;
&lt;P&gt;For the moment we can work with this, but if someone copy the certificats to his privat device it is a new corporate device.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But now the corparate iPad won't connect, RootCA is visible under configuration and ISSUING is rolled out over intune but it won't connect&lt;/P&gt;</description>
      <pubDate>Wed, 17 Sep 2025 08:51:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-vpn-only-on-domain-joined-devices/m-p/1238194#M7032</guid>
      <dc:creator>R.Kniger</dc:creator>
      <dc:date>2025-09-17T08:51:25Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect VPN only on domain joined devices</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-vpn-only-on-domain-joined-devices/m-p/1239009#M7062</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;we change radius to SAML and at the moment it works better also with äüö&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind regards&lt;/P&gt;</description>
      <pubDate>Mon, 29 Sep 2025 11:13:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-vpn-only-on-domain-joined-devices/m-p/1239009#M7062</guid>
      <dc:creator>R.Kniger</dc:creator>
      <dc:date>2025-09-29T11:13:36Z</dc:date>
    </item>
  </channel>
</rss>

