<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Global Protect Agent and SSID in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-agent-and-ssid/m-p/234217#M67144</link>
    <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43796"&gt;@killboxalpha&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Edit: I may have misread your post - HIP information and policy enforcement would only be after the client has connected to GlobalProtect so may not apply to this situation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thinking off the top of my head, you could use a PowerShell script to look if the reg key is present, if it's not use the XMLAPI&amp;nbsp;to send a tag to the firewall that update a dynamic address group, then use a policy to block access with SRC address as the dynamic address group.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/policy/register-ip-addresses-and-tags-dynamically" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/policy/register-ip-addresses-and-tags-dynamically&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;---&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can certainly block machines that connect to GlobalProtect from accessing resources (internet/internal resources etc) if they don't have a reg key present, this is done via HIP Based Policy Enforcement.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Create a new HIP object (Objects -&amp;gt; GlobalProtect -&amp;gt; HIP Objects), enable a "Custom Check" and create your custom check in the Registry Key tab.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. Add your HIP object to a HIP profile (&lt;SPAN&gt;Objects -&amp;gt; GlobalProtect -&amp;gt; HIP Profiles), set the match to "NOT" so only people WITHOUT the reg key will hit this profile.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;3. Create a security policy and add the HIP profile under the "User Tab"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;; with the action of deny in the security policy you can then block access for anyone that doesn't have the reg key present.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/81/globalprotect/globalprotect-admin-guide/host-information/configure-hip-based-policy-enforcement" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/81/globalprotect/globalprotect-admin-guide/host-information/configure-hip-based-policy-enforcement&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Cheers,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Luke.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 05 Oct 2018 21:31:45 GMT</pubDate>
    <dc:creator>LukeBullimore</dc:creator>
    <dc:date>2018-10-05T21:31:45Z</dc:date>
    <item>
      <title>Global Protect Agent and SSID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-agent-and-ssid/m-p/234067#M67091</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have configured GP agent with internal and external adresse to seamlessly work w/ always on for my endpoints and this works great. And users can not connect to other networks w/coppper cable without the internal GW. And SSID has to be punched in manually.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But one challange;&lt;/P&gt;&lt;P&gt;How do i protect new endpoints when its getting windows image from sccm if we have pre-defined the ssid and password in windows, the endpoint could get a unsecure connection before the script installs GlobalProtect Agent.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can i create a HIP rule/profile on the policy settings that require a GlobalProtect Agent installation (reg key) before wifi acccess is granted ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Oct 2018 08:28:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-agent-and-ssid/m-p/234067#M67091</guid>
      <dc:creator>killboxalpha</dc:creator>
      <dc:date>2018-10-05T08:28:40Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Agent and SSID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-agent-and-ssid/m-p/234127#M67119</link>
      <description>&lt;P&gt;HIP rules and profiles are applied to policies on the firewall itself, not on the client....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;can you not have GP as part of your image from SCCM.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;could you not apply a duff proxy to your devices and then remove the duff proxy settings as part of the installation script for GP.&lt;/P&gt;</description>
      <pubDate>Fri, 05 Oct 2018 16:10:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-agent-and-ssid/m-p/234127#M67119</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2018-10-05T16:10:10Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Agent and SSID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-agent-and-ssid/m-p/234128#M67120</link>
      <description>&lt;P&gt;hmmm perhaps not, the proxy settings will only restrict browsing , not general network access.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;perhaps including GP as part of the image may be a better idea.&lt;/P&gt;</description>
      <pubDate>Fri, 05 Oct 2018 16:12:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-agent-and-ssid/m-p/234128#M67120</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2018-10-05T16:12:36Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Agent and SSID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-agent-and-ssid/m-p/234217#M67144</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43796"&gt;@killboxalpha&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Edit: I may have misread your post - HIP information and policy enforcement would only be after the client has connected to GlobalProtect so may not apply to this situation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thinking off the top of my head, you could use a PowerShell script to look if the reg key is present, if it's not use the XMLAPI&amp;nbsp;to send a tag to the firewall that update a dynamic address group, then use a policy to block access with SRC address as the dynamic address group.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/policy/register-ip-addresses-and-tags-dynamically" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/policy/register-ip-addresses-and-tags-dynamically&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;---&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can certainly block machines that connect to GlobalProtect from accessing resources (internet/internal resources etc) if they don't have a reg key present, this is done via HIP Based Policy Enforcement.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Create a new HIP object (Objects -&amp;gt; GlobalProtect -&amp;gt; HIP Objects), enable a "Custom Check" and create your custom check in the Registry Key tab.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. Add your HIP object to a HIP profile (&lt;SPAN&gt;Objects -&amp;gt; GlobalProtect -&amp;gt; HIP Profiles), set the match to "NOT" so only people WITHOUT the reg key will hit this profile.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;3. Create a security policy and add the HIP profile under the "User Tab"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;; with the action of deny in the security policy you can then block access for anyone that doesn't have the reg key present.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/81/globalprotect/globalprotect-admin-guide/host-information/configure-hip-based-policy-enforcement" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/81/globalprotect/globalprotect-admin-guide/host-information/configure-hip-based-policy-enforcement&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Cheers,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Luke.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Oct 2018 21:31:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-agent-and-ssid/m-p/234217#M67144</guid>
      <dc:creator>LukeBullimore</dc:creator>
      <dc:date>2018-10-05T21:31:45Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Agent and SSID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-agent-and-ssid/m-p/234928#M67347</link>
      <description>&lt;P&gt;Hi LukeBullimore.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;yupp, could not reply fast enough sorry, the problem as you mention is that everything would hit after the GP agent was installed and not before, the solution was to create a script w/ssid+pass that would not activate before GP script install was done. This works now, after some tinkering.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thx for your input. Not sure who deserves the solved button.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Oct 2018 14:34:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-agent-and-ssid/m-p/234928#M67347</guid>
      <dc:creator>killboxalpha</dc:creator>
      <dc:date>2018-10-11T14:34:08Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Agent and SSID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-agent-and-ssid/m-p/234945#M67352</link>
      <description>&lt;P&gt;Luke gets my vote, helpful link and a registry drop to finish off......&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Laters&lt;/P&gt;</description>
      <pubDate>Thu, 11 Oct 2018 15:33:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-agent-and-ssid/m-p/234945#M67352</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2018-10-11T15:33:28Z</dc:date>
    </item>
  </channel>
</rss>

