<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Globalprotect auth certificate profile in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-auth-certificate-profile/m-p/598466#M119042</link>
    <description>&lt;P&gt;thanks but it doesn't answer my question.&amp;nbsp; I know it provides extra protection.&amp;nbsp; &amp;nbsp; I am looking for a way to prevent malicious actors from locking out my user accounts due to invalid login attempts.&amp;nbsp; I'm wondering if adding the certificate profile for portal would prevent it&lt;/P&gt;</description>
    <pubDate>Sun, 22 Sep 2024 03:02:55 GMT</pubDate>
    <dc:creator>securehops</dc:creator>
    <dc:date>2024-09-22T03:02:55Z</dc:date>
    <item>
      <title>Globalprotect auth certificate profile</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-auth-certificate-profile/m-p/598464#M119040</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Question on global protect authentication certificate profiles.&amp;nbsp; On our gateways, I've had a certificate profile configured to prevent non-company devices from connecting.&amp;nbsp; Has worked great, no real issues.&amp;nbsp; &amp;nbsp;However, this was only configured on the gateway, no the portal authentication.&amp;nbsp; &amp;nbsp;I'm trying to resolve an issue where bad actors are attempting globalprotect logins from valid active directory usernames and wind up locking those accounts out.&amp;nbsp;&amp;nbsp;I was wondering if certificate profile was added to the portal configuration as well,&amp;nbsp; would it prevent these failed authentication attempts from occuring?&lt;/P&gt;</description>
      <pubDate>Sun, 22 Sep 2024 02:20:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-auth-certificate-profile/m-p/598464#M119040</guid>
      <dc:creator>securehops</dc:creator>
      <dc:date>2024-09-22T02:20:53Z</dc:date>
    </item>
    <item>
      <title>Re: Globalprotect auth certificate profile</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-auth-certificate-profile/m-p/598465#M119041</link>
      <description>&lt;P&gt;Enabling cert Auth for GP portal would be extra layer of the protection. Even though if the malicious actor has the valid credentials they need to provide the valid certificate for successful authentication.&lt;/P&gt;</description>
      <pubDate>Sun, 22 Sep 2024 02:51:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-auth-certificate-profile/m-p/598465#M119041</guid>
      <dc:creator>Edsnow</dc:creator>
      <dc:date>2024-09-22T02:51:31Z</dc:date>
    </item>
    <item>
      <title>Re: Globalprotect auth certificate profile</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-auth-certificate-profile/m-p/598466#M119042</link>
      <description>&lt;P&gt;thanks but it doesn't answer my question.&amp;nbsp; I know it provides extra protection.&amp;nbsp; &amp;nbsp; I am looking for a way to prevent malicious actors from locking out my user accounts due to invalid login attempts.&amp;nbsp; I'm wondering if adding the certificate profile for portal would prevent it&lt;/P&gt;</description>
      <pubDate>Sun, 22 Sep 2024 03:02:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-auth-certificate-profile/m-p/598466#M119042</guid>
      <dc:creator>securehops</dc:creator>
      <dc:date>2024-09-22T03:02:55Z</dc:date>
    </item>
  </channel>
</rss>

