<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Palo Alto Scan Clients for Antivirus in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-scan-clients-for-antivirus/m-p/37603#M27554</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes Mark,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can used it for the mac's too.&lt;/P&gt;&lt;P&gt;If you like you can divide the checks for MAC and for Windows machines in separate IP Profiles, where one can be checking if the system has Windows OS, and an AV solution running (and/or up to date), and another HIP Profile that will check if the system is MAC OS and there is and an AV solution running (and/or up to date). For that reason when creating the HIP object, in the GENERAL tab, mark the Host info and select the OS as needed (mac or win), and if needed limit the versions that are in usage in your environment (maybe you are only using windows 7 Professional and windows 8.1 for the Microsoft OS and Mac OS X 10.8 from Apple). After that make the needed combination of HIP objects into HIP Profiles (using logical operators) and attache the profile to to a security rule. Dont forget to add block rule for the users that dont have the HIP profile, or at least limit them to just be able to go to certain sites (like the update server for the AV solution in use).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 02 Feb 2014 12:55:16 GMT</pubDate>
    <dc:creator>ialeksov</dc:creator>
    <dc:date>2014-02-02T12:55:16Z</dc:date>
    <item>
      <title>Palo Alto Scan Clients for Antivirus</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-scan-clients-for-antivirus/m-p/37600#M27551</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a quick question regarding the capabilities of the Palo Alto's. In this scenario, we want to be able to deny computers who connect via SSL VPN (GlobalProtect) access to the network if they do not have antivirus on their machines. Can Palo Alto do this? If so, can you direct me to the procedures of how to set this up?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Jan 2014 22:46:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-scan-clients-for-antivirus/m-p/37600#M27551</guid>
      <dc:creator>MarkTan</dc:creator>
      <dc:date>2014-01-31T22:46:12Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Scan Clients for Antivirus</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-scan-clients-for-antivirus/m-p/37601#M27552</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mark,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use HIP checks to do this.&lt;/P&gt;&lt;P&gt;You will need to configure HIP object for the AV solutions that you want the firewall to check for, than create a HIP profile and to assign the profile to a security rule (this is selected in the Users tab of the security policy).&lt;/P&gt;&lt;P&gt;Please check this article. It is for widows patches, but the principle is the same.&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-6371"&gt;How to Configure HIP for Missing Microsoft Patches&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Jan 2014 23:37:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-scan-clients-for-antivirus/m-p/37601#M27552</guid>
      <dc:creator>ialeksov</dc:creator>
      <dc:date>2014-01-31T23:37:55Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Scan Clients for Antivirus</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-scan-clients-for-antivirus/m-p/37602#M27553</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does this also work for Macs?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 02 Feb 2014 04:18:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-scan-clients-for-antivirus/m-p/37602#M27553</guid>
      <dc:creator>MarkTan</dc:creator>
      <dc:date>2014-02-02T04:18:34Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Scan Clients for Antivirus</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-scan-clients-for-antivirus/m-p/37603#M27554</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes Mark,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can used it for the mac's too.&lt;/P&gt;&lt;P&gt;If you like you can divide the checks for MAC and for Windows machines in separate IP Profiles, where one can be checking if the system has Windows OS, and an AV solution running (and/or up to date), and another HIP Profile that will check if the system is MAC OS and there is and an AV solution running (and/or up to date). For that reason when creating the HIP object, in the GENERAL tab, mark the Host info and select the OS as needed (mac or win), and if needed limit the versions that are in usage in your environment (maybe you are only using windows 7 Professional and windows 8.1 for the Microsoft OS and Mac OS X 10.8 from Apple). After that make the needed combination of HIP objects into HIP Profiles (using logical operators) and attache the profile to to a security rule. Dont forget to add block rule for the users that dont have the HIP profile, or at least limit them to just be able to go to certain sites (like the update server for the AV solution in use).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 02 Feb 2014 12:55:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-scan-clients-for-antivirus/m-p/37603#M27554</guid>
      <dc:creator>ialeksov</dc:creator>
      <dc:date>2014-02-02T12:55:16Z</dc:date>
    </item>
  </channel>
</rss>

