<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Most secure way to validate laptop, desktop and mobile devices? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/most-secure-way-to-validate-laptop-desktop-and-mobile-devices/m-p/190360#M57500</link>
    <description>&lt;P&gt;I'm new to networking in general and looking for the most secure way to ensure those joining our network actually belong on the network. We have a moderate hierarchy of users with a fairly even mix of desktops, laptops and mobile devices.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What I'm looking to achieve:&lt;/P&gt;&lt;P&gt;- Only specific devices are able to connect to network (whitelist specific, deny rest)&lt;/P&gt;&lt;P&gt;- Group devices into groups for different filtering rules&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Notes:&lt;/P&gt;&lt;P&gt;- We have a single wifi spread throughout the site which managament and operators share&lt;/P&gt;&lt;P&gt;- We have outside contractors onsite which need access temporarily&lt;/P&gt;&lt;P&gt;- We use GlobalProtect to connect to the network remotely; I need to ensure this isn't disrupted&lt;/P&gt;&lt;P&gt;- We have a tunnel in place to a sister site that also needs to stay connected&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From what I've read so far it seams that a certificate based authentication would be the most secure, though I've no idea where to start or if it's even possible to implement on mobile or temporary devices.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Would very much appreciate any help.&lt;/P&gt;</description>
    <pubDate>Wed, 06 Dec 2017 15:39:32 GMT</pubDate>
    <dc:creator>davidgregg</dc:creator>
    <dc:date>2017-12-06T15:39:32Z</dc:date>
    <item>
      <title>Most secure way to validate laptop, desktop and mobile devices?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/most-secure-way-to-validate-laptop-desktop-and-mobile-devices/m-p/190360#M57500</link>
      <description>&lt;P&gt;I'm new to networking in general and looking for the most secure way to ensure those joining our network actually belong on the network. We have a moderate hierarchy of users with a fairly even mix of desktops, laptops and mobile devices.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What I'm looking to achieve:&lt;/P&gt;&lt;P&gt;- Only specific devices are able to connect to network (whitelist specific, deny rest)&lt;/P&gt;&lt;P&gt;- Group devices into groups for different filtering rules&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Notes:&lt;/P&gt;&lt;P&gt;- We have a single wifi spread throughout the site which managament and operators share&lt;/P&gt;&lt;P&gt;- We have outside contractors onsite which need access temporarily&lt;/P&gt;&lt;P&gt;- We use GlobalProtect to connect to the network remotely; I need to ensure this isn't disrupted&lt;/P&gt;&lt;P&gt;- We have a tunnel in place to a sister site that also needs to stay connected&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From what I've read so far it seams that a certificate based authentication would be the most secure, though I've no idea where to start or if it's even possible to implement on mobile or temporary devices.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Would very much appreciate any help.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Dec 2017 15:39:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/most-secure-way-to-validate-laptop-desktop-and-mobile-devices/m-p/190360#M57500</guid>
      <dc:creator>davidgregg</dc:creator>
      <dc:date>2017-12-06T15:39:32Z</dc:date>
    </item>
    <item>
      <title>Re: Most secure way to validate laptop, desktop and mobile devices?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/most-secure-way-to-validate-laptop-desktop-and-mobile-devices/m-p/190475#M57525</link>
      <description>&lt;P&gt;I believe the only way to do so with a PA is with Global Protect and you could use certificates.&amp;nbsp; &amp;nbsp;Otherwise, you would have to look at a genuine NAC product.&amp;nbsp; Clearpass (aruba - hp) makes a pretty extensive one with a lot of capabilities, there are others out there too.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Dec 2017 21:47:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/most-secure-way-to-validate-laptop-desktop-and-mobile-devices/m-p/190475#M57525</guid>
      <dc:creator>Securitylady</dc:creator>
      <dc:date>2017-12-06T21:47:17Z</dc:date>
    </item>
    <item>
      <title>Re: Most secure way to validate laptop, desktop and mobile devices?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/most-secure-way-to-validate-laptop-desktop-and-mobile-devices/m-p/190494#M57531</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/78574"&gt;@davidgregg&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;1) Have you configured user-id already, because if so you can restrict all security policies to known-user and as long as the IP has a user-id mapping the policies would function, but if they didn't have a mapped user-id entry then they would hit the default deny rule.&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) Does your Palo Alto handle your DHCP, or is this another network device?&amp;nbsp;&lt;/P&gt;&lt;P&gt;3) What are you using to provide your wireless, and do you know if you can pull user-id from that device?&amp;nbsp;&lt;/P&gt;&lt;P&gt;4) Are your users okay with being presented a captive portal, or not?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Essentially, yes the Palo Alto can do what you are asking. The setup is somewhat complex and requires a few things be put in place to do so properly, but it isn't impossible.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Dec 2017 22:32:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/most-secure-way-to-validate-laptop-desktop-and-mobile-devices/m-p/190494#M57531</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-12-06T22:32:22Z</dc:date>
    </item>
    <item>
      <title>Re: Most secure way to validate laptop, desktop and mobile devices?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/most-secure-way-to-validate-laptop-desktop-and-mobile-devices/m-p/190652#M57556</link>
      <description>&lt;P&gt;Hi Mate,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Apart from the user id, zones and security rules. Ye can go one step further with hip checks to look at the devices connecting.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can use the hip profiles in conjunction with the user id, zones etc, to make sure the devices connecting are above board and not just the user's credentials &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/71/globalprotect/globalprotect-admin-guide/globalprotect-quick-configs/globalprotect-for-internal-hip-checking-and-user-based-access" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/71/globalprotect/globalprotect-admin-guide/use-host-information-in-policy-enforcement/configure-hip-based-policy-enforcement&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Featured-Articles/DotW-HIP-checks-for-missing-patches-for-multiple-vendors-on-one/ta-p/73814" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Featured-Articles/DotW-HIP-checks-for-missing-patches-for-multiple-vendors-on-one/ta-p/73814&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;details of what can be checked with the hip checks are below.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="hipChecks.GIF" style="width: 500px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/12909i977C569E949822B7/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="hipChecks.GIF" alt="hipChecks.GIF" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;hope this helps,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rob&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Dec 2017 16:34:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/most-secure-way-to-validate-laptop-desktop-and-mobile-devices/m-p/190652#M57556</guid>
      <dc:creator>DonohoeRobert</dc:creator>
      <dc:date>2017-12-07T16:34:58Z</dc:date>
    </item>
  </channel>
</rss>

