<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Always on Global Protect in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/always-on-global-protect/m-p/462256#M102247</link>
    <description>&lt;P&gt;Hello All,&lt;/P&gt;
&lt;P&gt;Looking to get advice on this topic. The idea is to have the users connect via a VPN tunnel regardless of their location, internal LAN or working from home, etc. I need to make it easy on the users so its to a burden, e.g. having to authenticate to the vpn after logging into heir workstations with similar creds.&lt;/P&gt;
&lt;P&gt;I'm thinking of something like username, password, and MFA token for external and just MFA token for internal.&lt;/P&gt;
&lt;P&gt;What have you done and what has worked well without too much burden onto the end user?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers!&lt;/P&gt;</description>
    <pubDate>Mon, 31 Jan 2022 20:31:33 GMT</pubDate>
    <dc:creator>OtakarKlier</dc:creator>
    <dc:date>2022-01-31T20:31:33Z</dc:date>
    <item>
      <title>Always on Global Protect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/always-on-global-protect/m-p/462256#M102247</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;
&lt;P&gt;Looking to get advice on this topic. The idea is to have the users connect via a VPN tunnel regardless of their location, internal LAN or working from home, etc. I need to make it easy on the users so its to a burden, e.g. having to authenticate to the vpn after logging into heir workstations with similar creds.&lt;/P&gt;
&lt;P&gt;I'm thinking of something like username, password, and MFA token for external and just MFA token for internal.&lt;/P&gt;
&lt;P&gt;What have you done and what has worked well without too much burden onto the end user?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers!&lt;/P&gt;</description>
      <pubDate>Mon, 31 Jan 2022 20:31:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/always-on-global-protect/m-p/462256#M102247</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2022-01-31T20:31:33Z</dc:date>
    </item>
    <item>
      <title>Re: Always on Global Protect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/always-on-global-protect/m-p/462326#M102255</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;These machines are all managed right, nothing BYOD (or at least if it's BYOD it's enrolled)? If they're all managed and you have an internal PKI I would just use certificates for authentication. It's the easiest way from an end-user aspect because they don't have to do anything special from a machine aspect, just sign in like they do normally and the certificates will take care of everything else.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 31 Jan 2022 22:01:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/always-on-global-protect/m-p/462326#M102255</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2022-01-31T22:01:12Z</dc:date>
    </item>
    <item>
      <title>Re: Always on Global Protect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/always-on-global-protect/m-p/462575#M102273</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Yeah I have been thinking about certificates, however they can be exported and used on a non-corp machine. Guess we can use posture validation to verify. Yes this will be only corp owned machines, no byod.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just seeing what else others have done.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Tue, 01 Feb 2022 18:48:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/always-on-global-protect/m-p/462575#M102273</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2022-02-01T18:48:10Z</dc:date>
    </item>
    <item>
      <title>Re: Always on Global Protect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/always-on-global-protect/m-p/462649#M102283</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Depending on how you generate them and import them if need be you can make them non-exportable to prevent that. Either way I would still recommend using HIP checks to verify that it's actually an issued endpoint. I always try to make our "Issued Device" profile as detailed as possible. Is it joined to the proper domain, does it have the proper EDR tool installed, does it have any custom applications we install, ect.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You won't ever get to the point where someone with the proper permissions couldn't generate a valid certificate, install the proper applications, and join it to your domain. We've taken the mindset that if you make it pass all of our security checks and have the permission to actually install everything, generate the certificates, join it to the domain, and get everything setup properly you likely wouldn't risk your job to do so.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Feb 2022 01:59:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/always-on-global-protect/m-p/462649#M102283</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2022-02-02T01:59:03Z</dc:date>
    </item>
  </channel>
</rss>

