<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PALOALTO NGFW HIP in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/paloalto-ngfw-hip/m-p/1235374#M6160</link>
    <description>&lt;P&gt;The point is that I don’t want this for a domain environment. The devices I want to apply HIP to are only non-domain devices, such as mobile devices (e.g., Android/iOS).&lt;/P&gt;&lt;P&gt;On some of these, it’s possible to enable AV check for HIP, but on others (e.g., Android and iOS devices), HIP data does not return any information related to AV check. For this reason, for such devices, I can perform HIP checks using MAC/Serial Number/Host ID + CACert check.&lt;/P&gt;&lt;P&gt;I’m just stuck on where exactly I should add the list of devices (i.e., MAC or Serial Number or Host ID).&lt;/P&gt;</description>
    <pubDate>Mon, 04 Aug 2025 17:57:21 GMT</pubDate>
    <dc:creator>OrkhanM</dc:creator>
    <dc:date>2025-08-04T17:57:21Z</dc:date>
    <item>
      <title>PALOALTO NGFW HIP</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/paloalto-ngfw-hip/m-p/1235349#M6156</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;I need help with configuring Host Information Profiles (HIP) using device attributes such as MAC address, serial number, or host ID. When creating a HIP object with these attributes, where should I add the list of devices so they are recognized by the firewall?&lt;BR /&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Mon, 04 Aug 2025 13:09:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/paloalto-ngfw-hip/m-p/1235349#M6156</guid>
      <dc:creator>OrkhanM</dc:creator>
      <dc:date>2025-08-04T13:09:51Z</dc:date>
    </item>
    <item>
      <title>Re: PALOALTO NGFW HIP</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/paloalto-ngfw-hip/m-p/1235362#M6157</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1097754153"&gt;@OrkhanM&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;I would generally telling most people that this isn't the path that you want to go down from a management aspect. It would be easier to manage if you started (or have) serial numbers assigned and use an LDAP server profile to be able to utilize the 'Managed' option to verify that the serial number is present in AD.&lt;/P&gt;
&lt;P&gt;This will allow the firewall to pull the list of serial numbers from active directory by looking at the computer objects and the serialNumber attribute to validate whether or not a computer is actually present in AD or not.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you can't do that for some reason, you'll ideally have automation in place to create individual HIP objects for each entry that you want to allow and then utilize a profile to group all of the individual objects. I don't believe that you can match multiple different strings with a single object, so unless you can make them all fit with a Contains operator (which effectively would only allow a single manufacturer and doesn't actually prevent much) you're going to need to utilize a profile to group all of the individual objects which doesn't really scale.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Aug 2025 15:01:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/paloalto-ngfw-hip/m-p/1235362#M6157</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2025-08-04T15:01:20Z</dc:date>
    </item>
    <item>
      <title>Re: PALOALTO NGFW HIP</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/paloalto-ngfw-hip/m-p/1235374#M6160</link>
      <description>&lt;P&gt;The point is that I don’t want this for a domain environment. The devices I want to apply HIP to are only non-domain devices, such as mobile devices (e.g., Android/iOS).&lt;/P&gt;&lt;P&gt;On some of these, it’s possible to enable AV check for HIP, but on others (e.g., Android and iOS devices), HIP data does not return any information related to AV check. For this reason, for such devices, I can perform HIP checks using MAC/Serial Number/Host ID + CACert check.&lt;/P&gt;&lt;P&gt;I’m just stuck on where exactly I should add the list of devices (i.e., MAC or Serial Number or Host ID).&lt;/P&gt;</description>
      <pubDate>Mon, 04 Aug 2025 17:57:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/paloalto-ngfw-hip/m-p/1235374#M6160</guid>
      <dc:creator>OrkhanM</dc:creator>
      <dc:date>2025-08-04T17:57:21Z</dc:date>
    </item>
    <item>
      <title>Re: PALOALTO NGFW HIP</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/paloalto-ngfw-hip/m-p/1235460#M6164</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1097754153"&gt;@OrkhanM&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Assuming that you do not have an MDM?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You would need to do what I've described above, each endpoint that you wish to allow will need to be an individual HIP object, you will then need to group them into a HIP Profile and use it as needed (remember that profiles can be used as matching criteria in other profiles).&lt;/P&gt;
&lt;P&gt;To keep the administration aspect of this lower, I would look into automating this as much as possible. When I've needed to do this in the past I had built out automation to take a source file and templated the creation of HIP Objects and the Profiles that were in use for those devices to account for new devices. That isn't something that the firewall can do natively however, so you either live with the administration overhead or automate it away.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Aug 2025 13:56:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/paloalto-ngfw-hip/m-p/1235460#M6164</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2025-08-05T13:56:17Z</dc:date>
    </item>
    <item>
      <title>Re: PALOALTO NGFW HIP</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/paloalto-ngfw-hip/m-p/1237463#M6271</link>
      <description>&lt;P&gt;Thanks for helping.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Sep 2025 06:54:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/paloalto-ngfw-hip/m-p/1237463#M6271</guid>
      <dc:creator>OrkhanM</dc:creator>
      <dc:date>2025-09-08T06:54:55Z</dc:date>
    </item>
  </channel>
</rss>

