<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: GlobalProtect restrict to approved devices in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-restrict-to-approved-devices/m-p/235808#M67579</link>
    <description>&lt;P&gt;Hey Dylan,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yep, this is totally do-able.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Option one - via the authentication profile.&lt;/P&gt;&lt;P&gt;Go to Network -&amp;gt; GlobalProtect -&amp;gt; Portals -&amp;gt; {Portal Name} -&amp;gt; Authentication Tab - note the Auth Profile being used.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then go to Device -&amp;gt; Authentication profiles -&amp;gt; Add the AD group into the auth profiles allow list. Note: this would affect any other services that use this authentication profile like captive portal etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Option two - via the portal/gateway agent config&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Go to Network -&amp;gt; GlobalProtect -&amp;gt; Portals -&amp;gt; {Portal Name} -&amp;gt; AgentTab&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Open the config name and go to the User/User Group tab and add the AD group there&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;This is presuming you have User-ID and Group Mapping configured, if you haven't, it might be best to start here:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/user-id/map-ip-addresses-to-users" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/user-id/map-ip-addresses-to-users&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/user-id/map-users-to-groups" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/user-id/map-users-to-groups&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 17 Oct 2018 16:10:22 GMT</pubDate>
    <dc:creator>LukeBullimore</dc:creator>
    <dc:date>2018-10-17T16:10:22Z</dc:date>
    <item>
      <title>GlobalProtect restrict to approved devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-restrict-to-approved-devices/m-p/235794#M67577</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am trying to restrict what devices users can log in to GlobalProtect with to only machines that we have given them.&amp;nbsp; Since all of those machines would be domain-joined, I would expect that I can import an AD group that contains those machines and use that as a restriction, but all I can find is how to use an AD group for allowed users (which I am also using).&amp;nbsp; &amp;nbsp;Can I restrict this the way that I want, or is that not possible?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Dylan&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Oct 2018 16:00:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-restrict-to-approved-devices/m-p/235794#M67577</guid>
      <dc:creator>Dylanroehrig</dc:creator>
      <dc:date>2018-10-17T16:00:00Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect restrict to approved devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-restrict-to-approved-devices/m-p/235808#M67579</link>
      <description>&lt;P&gt;Hey Dylan,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yep, this is totally do-able.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Option one - via the authentication profile.&lt;/P&gt;&lt;P&gt;Go to Network -&amp;gt; GlobalProtect -&amp;gt; Portals -&amp;gt; {Portal Name} -&amp;gt; Authentication Tab - note the Auth Profile being used.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then go to Device -&amp;gt; Authentication profiles -&amp;gt; Add the AD group into the auth profiles allow list. Note: this would affect any other services that use this authentication profile like captive portal etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Option two - via the portal/gateway agent config&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Go to Network -&amp;gt; GlobalProtect -&amp;gt; Portals -&amp;gt; {Portal Name} -&amp;gt; AgentTab&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Open the config name and go to the User/User Group tab and add the AD group there&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;This is presuming you have User-ID and Group Mapping configured, if you haven't, it might be best to start here:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/user-id/map-ip-addresses-to-users" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/user-id/map-ip-addresses-to-users&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/user-id/map-users-to-groups" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/user-id/map-users-to-groups&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Oct 2018 16:10:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-restrict-to-approved-devices/m-p/235808#M67579</guid>
      <dc:creator>LukeBullimore</dc:creator>
      <dc:date>2018-10-17T16:10:22Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect restrict to approved devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-restrict-to-approved-devices/m-p/235813#M67584</link>
      <description>&lt;P&gt;Thanks for the quick reply.&amp;nbsp; I am currently using an AD group for the users, so I have an AD group of allowed GP users, and that group is in the Auth profile allowed list.&amp;nbsp; You're saying that I can do the same for a group of computers?&amp;nbsp; Everything in the group mapping seemed to be user-centric which is why I didn't think that would work.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Oct 2018 16:19:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-restrict-to-approved-devices/m-p/235813#M67584</guid>
      <dc:creator>Dylanroehrig</dc:creator>
      <dc:date>2018-10-17T16:19:29Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect restrict to approved devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-restrict-to-approved-devices/m-p/235814#M67585</link>
      <description>&lt;P&gt;Ah, I may have misunderstood. You cannot specify computer names in auth profiles or within the user/group config it must either be a user or group.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Since you mentioned all the machines are part of the domain, you could add them all to a new group called vpn then add this VPN group to either the allow list in the auth profile or the portal/agent config like I mentioned. Doing this method option two would be preferred, or otherwise I would make a new authentication profile specific to GlobalProtect; utilising the allow list method.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Oct 2018 16:23:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-restrict-to-approved-devices/m-p/235814#M67585</guid>
      <dc:creator>LukeBullimore</dc:creator>
      <dc:date>2018-10-17T16:23:48Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect restrict to approved devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-restrict-to-approved-devices/m-p/235847#M67599</link>
      <description>&lt;P&gt;I'll give it a shot.&amp;nbsp; What I meant with my user centric comment was that in the group mapping configuration, there are options for user attributes, but not computer (Primary Username for example). Since the computer isn't actually doing the authenticating, I wasn't sure this would work.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've been looking at this:&amp;nbsp;&lt;A href="https://researchcenter.paloaltonetworks.com/2015/06/byod-makes-you-productive-and-its-also-why-your-nac-deployments-fail/" target="_blank"&gt;https://researchcenter.paloaltonetworks.com/2015/06/byod-makes-you-productive-and-its-also-why-your-nac-deployments-fail/&lt;/A&gt; which says:&amp;nbsp;&lt;STRONG&gt;GlobalProtect can also be used to perform Host Integrity Posture (HIP) checks&amp;nbsp;&lt;/STRONG&gt;which sounds like another way to go. I don't think that i could use the domain membership thing, but maybe something else that would be specific to machines that we provide.&amp;nbsp; My main thing is, I want to prevent personal computers from connecting.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Oct 2018 17:39:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-restrict-to-approved-devices/m-p/235847#M67599</guid>
      <dc:creator>Dylanroehrig</dc:creator>
      <dc:date>2018-10-17T17:39:24Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect restrict to approved devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-restrict-to-approved-devices/m-p/235944#M67629</link>
      <description>&lt;P&gt;We use windows PKI so that only domain members can connect via GP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;you can either place the certificate in the user store for user auth or in the machine store for device auth.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Oct 2018 05:27:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-restrict-to-approved-devices/m-p/235944#M67629</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2018-10-18T05:27:00Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect restrict to approved devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-restrict-to-approved-devices/m-p/236877#M67873</link>
      <description>&lt;P&gt;I marked two things correct because the first led me to the second.&amp;nbsp; I ended up using a HIP profile.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1 - created a HIP Object where on the general tab the Host Info "domain" is our domain&lt;/P&gt;&lt;P&gt;2 - Created a HIP Profile that just contained the new HIP object&lt;/P&gt;&lt;P&gt;3 - on my Security Policies from the GlobalProtect Zone, I put that matching the HIP Profile was a requirement from the source zone&lt;/P&gt;</description>
      <pubDate>Wed, 24 Oct 2018 17:45:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-restrict-to-approved-devices/m-p/236877#M67873</guid>
      <dc:creator>Dylanroehrig</dc:creator>
      <dc:date>2018-10-24T17:45:42Z</dc:date>
    </item>
  </channel>
</rss>

