GlobalProtect Host Information Profile (HIP)

What is a Host Information Profile (HIP)?

A Host Information Profile (HIP), often referred to simply as "HIP Check", is a dynamic security posture assessment feature within Palo Alto Networks GlobalProtect. The GlobalProtect agent running on an endpoint (laptop, mobile device) collects information about the host's state – such as operating system version, patch level, antivirus status, disk encryption, running processes, registry keys, etc.

This collected information forms a HIP report, which is sent to the GlobalProtect Portal and/or Gateway. The firewall then compares this report against predefined HIP Profiles to determine if the endpoint meets the organization's security requirements.

The result of this comparison (HIP match or HIP mismatch) can then be used as a matching criterion in Security and Authentication policies to enforce granular access control based not just on user identity, but also on the security posture and compliance of the connecting device.

Understanding the fundamental purpose of HIP – device posture assessment for policy enforcement – is crucial for the exam.

Collects Host Info

Sent to

Compares with

Results in

Used in

Enforces

Endpoint with GP Agent

HIP Report

GP Portal / Gateway

HIP Profiles

HIP Match / Mismatch

Security & Auth Policies

Granular Access Control

Basic concept of HIP: From collection to enforcement.

Core Components of HIP Configuration

Several key components work together to enable HIP functionality:

1. HIP Objects: Defining What to Collect

Purpose: Define the specific attributes or conditions the GlobalProtect agent should check for on the endpoint.

Location: Objects > GlobalProtect > HIP Objects

Examples of Attributes:

Multiple conditions can be combined within a single HIP Object using AND/OR logic.

Be familiar with the types of attributes HIP Objects can check and where they are configured. Custom checks are powerful but have caveats.

2. HIP Profiles: Defining the Required State

Purpose: Define the required security posture by referencing one or more HIP Objects. It determines if a device is considered "compliant", "non-compliant", or matches some other defined state.

Location: Objects > GlobalProtect > HIP Profiles

Configuration:

HIP Profiles are where you define what constitutes a "compliant" or "non-compliant" device by combining HIP Objects. Understand the AND/OR logic and Match/Exclude options.

HIP Profile - e.g. Compliant-Windows-Device

HIP Object: Win10 22H2+

HIP Object: Antivirus Enabled

HIP Object: BitLocker Encrypted

AND

HIP Profile Match

Example of HIP Objects combined in a HIP Profile.

Enabling HIP Collection & Usage

For HIP to function, data collection must be explicitly enabled on the GlobalProtect Portal and/or Gateways.

Portal/Gateway Agent Configuration:

HIP data collection is specified in the agent configuration associated with the Portal and Gateways.

  1. For Portal:
    • Navigate to Network > GlobalProtect > Portals > [Your Portal Name] > Agent > [Your Agent Config] > Data Collection Tab .
    • Check the box for 'Enable' under Host Information Profile (HIP) Data Collection.
    • Optionally, configure HIP report submission intervals.
  2. For Gateway(s):
    • Navigate to Network > GlobalProtect > Gateways > [Your Gateway Name] > Agent > Data Collection Tab .
    • Check the box for 'Enable' under Host Information Profile (HIP) Data Collection.
    • The Gateway typically uses the HIP data for continuous monitoring and policy enforcement.
Remember that HIP collection needs to be enabled in the Agent Configuration applied to both Portals (for initial check and config delivery) and Gateways (for ongoing enforcement).
Note: The Portal can be configured to deny agent configuration if an initial HIP check fails. This is a stricter enforcement point even before the user connects to a Gateway.

HIP Notification Messages & Policy Enforcement

HIP Notification Messages (Optional but Recommended)

Purpose: To inform users why their access might be restricted due to a failed HIP check and guide them towards remediation.

Location: Device > Response Pages (The exact path might vary slightly based on PAN-OS version, look for GlobalProtect related response pages or HIP notifications).

Clear and actionable notification messages are crucial for user experience and reducing helpdesk load.

Policy Enforcement: Using HIP Profiles

Once HIP Objects and Profiles are defined, and HIP collection is enabled, you use the HIP Profiles as matching criteria in:

  1. Security Policy Rules:
    • Navigate to Policies > Security .
    • When creating or editing a rule, go to the 'User' tab.
    • In the 'HIP Profiles' section, add the desired HIP Profile(s).
    • Traffic will only match this rule if, in addition to other criteria (User-ID, Zone, App-ID etc.), the connecting device's HIP report matches the specified HIP Profile.
  2. Authentication Policy Rules:
    • Navigate to Device > Authentication Policy .
    • When creating or editing a rule, add HIP Profile(s) as Match Criteria.
    • This allows you to enforce different authentication requirements (e.g., require MFA only for devices that are partially compliant or not company-managed) based on device posture.
Key enforcement points: Security Policies (for traffic access) and Authentication Policies (for modifying authentication requirements). Know where to apply HIP Profiles.

How HIP Works: The Workflow

The HIP process involves several steps, from agent connection to policy enforcement:

Firewall Policy Engine GP Gateway GP Portal GP Agent (Endpoint) Firewall Policy Engine GP Gateway GP Portal GP Agent (Endpoint) alt [Portal denies config on HIP fail (Optional)] [Portal provides config] alt [HIP Enabled on Portal] [Portal does not request HIP] alt [HIP Enabled on Gateway] User Traffic Flow Policy includes User-ID, App-ID, Zone, Address AND HIP Profile match status alt [Policy Match (incl. HIP)] [Policy Mismatch (or HIP Mismatch)] loop [Periodic Re-submission] 1. Connect & Authenticate User 2. Request HIP Report 3. Collect Host Info (based on config from Portal) 4. Submit HIP Report 5. Evaluate Report vs HIP Profiles 5a. Deny Config 5b. Provide Config (incl. Gateway List) Provide Config (incl. Gateway List) 6. Connect to Gateway & Authenticate 7. Request HIP Report 8. Submit HIP Report 9. Evaluate Report vs HIP Profiles 10. Store HIP Match/Mismatch Result User Traffic (Tunneled) User Traffic for Inspection 11. Evaluate Security/Auth Policy 12a. Grant Access Access Granted 12b. Deny Access Access Denied / Notification Submit Updated HIP Report Re-evaluate HIP Update HIP Match Status

GlobalProtect HIP Workflow from Agent to Policy Enforcement.

  1. The GlobalProtect agent connects to the Portal and authenticates the user.
  2. If HIP data collection is enabled in the Portal's agent configuration, the Portal requests a HIP report.
  3. The agent scans the endpoint based on the HIP Objects defined in the configuration received from the Portal.
  4. The agent sends the HIP report (a summary of its findings) back to the Portal.
  5. The Portal evaluates the report against its configured HIP Profiles. (Optional) The Portal can be configured to deny configuration delivery if the device doesn't meet certain HIP criteria at this stage.
  6. The agent receives its configuration, including the list of Gateways.
  7. The agent connects to the selected Gateway and authenticates (potentially using cookies or re-authenticating).
  8. If HIP data collection is enabled on the Gateway, it requests a HIP report from the agent.
  9. The agent sends the current HIP report to the Gateway.
  10. The Gateway evaluates the report against its configured HIP Profiles. The result (match/mismatch for various profiles) is associated with the user/device session.
  11. When user traffic arrives through the tunnel (or from an internal user whose HIP info is known), the firewall's Policy Engine uses the HIP Profile match status (along with User-ID, App-ID, Zones, Addresses, etc.) as criteria in Security and Authentication Policy rules.
  12. Access is granted or denied based on the policy match, which now includes the device's security posture via the HIP Profile.
  13. The agent periodically re-submits HIP reports to the Gateway (and sometimes Portal), allowing for continuous posture assessment and dynamic policy adjustments if the device's compliance state changes.
Understand the roles of the Portal and Gateway in the HIP process. The Portal often performs an initial check, while the Gateway handles ongoing checks for access enforcement. Periodic re-submission is key for dynamic updates.

How HIP Enables Zero Trust Access (ZTA)

Zero Trust is a security model based on the principle of "never trust, always verify." It assumes that threats can exist both outside and inside the traditional network perimeter. Access decisions should be granular and enforced based on verified identity and context, not just network location. GlobalProtect HIP is a cornerstone technology for implementing ZTA for remote and internal access:

HIP's Contribution

Zero Trust Principles

Policy

Never Trust, Always Verify

Least Privilege Access

Assume Breach

Explicit Verification

Verifies Device Trust (Posture)

Enables Granular, Conditional Access

Dynamic & Context-Aware

Reduces Attack Surface

User Identity (e.g., MFA)

Access Decision Engine

Application Context (App-ID)

Grant/Deny/Limit Access

HIP's role in contributing to Zero Trust principles.

  1. Verifying Device Trust ("Always Verify"):
    • ZTA requires verifying not just the user but also the device attempting access.
    • HIP provides the mechanism to continuously assess the security posture and health of the endpoint.
    • Access is granted only if both the user authenticates successfully AND the device meets the minimum security requirements defined in the HIP Profile.
  2. Enforcing Least Privilege Access:
    • Different HIP Profiles can represent varying levels of device compliance (e.g., Fully-Compliant, Partially-Compliant-Needs-Patching, Non-Compliant).
    • Security Policies can use these HIP Profiles to grant granular access:
      • Fully compliant devices get access to sensitive applications.
      • Partially compliant devices might get access only to less sensitive resources or a remediation portal.
      • Non-compliant devices might be denied access entirely or only allowed to access helpdesk resources.
    • This ensures users only get the access appropriate for their current device posture, minimizing the potential impact of a compromised or vulnerable endpoint.
  3. Dynamic and Context-Aware Access Control:
    • HIP reports are submitted periodically (configurable).
    • If a device's posture changes (e.g., antivirus becomes disabled, a critical patch is missed), the next HIP report will reflect this.
    • The firewall re-evaluates the HIP profile match, and Security Policies can dynamically adjust or revoke access in near real-time based on the updated posture.
    • This moves away from static, location-based trust towards continuous, context-aware verification.
  4. Reducing the Attack Surface:
    • By preventing non-compliant or potentially compromised devices from accessing sensitive resources, HIP significantly reduces the pathways available for malware propagation or data breaches originating from unhealthy endpoints.

In a Zero Trust architecture, HIP complements strong user authentication (like MFA via SAML integration) and granular App-ID based policies to create a robust access control model based on verified user identity, verified device health, and allowed application usage.

HIP is a key enabler for Zero Trust Network Access (ZTNA). Understand how HIP contributes to verifying identity (of the device), enforcing least privilege, and providing dynamic access control.

HIP with External Gateways

External Gateways are the typical deployment model for providing secure remote access to users outside the corporate network (e.g., home users, traveling users).

Role in Enforcing Restrictions:

For External Gateways, HIP is crucial for ensuring remote devices meet security standards before accessing corporate resources or the internet via the corporate security stack.

Scenario: Remote User Access

A remote user attempts to connect via GlobalProtect to an External Gateway.

  1. User authenticates.
  2. GP agent submits HIP report.
  3. Gateway checks HIP.
    • If device is compliant (e.g., OS patched, AV running, disk encrypted): User is granted access to internal applications and secure internet browsing via the firewall.
    • If device is non-compliant (e.g., AV definitions outdated): User is redirected to a captive portal with instructions to update AV, or access is limited to only the update server.

HIP with Internal Gateways

Internal Gateways are used to provide secure access and posture validation for users within the corporate network. Their role and how HIP is leveraged can be more nuanced compared to External Gateways.

Purpose of Internal Gateways:

How Internal Gateways Use HIP:

An Internal Gateway's primary function related to HIP is to collect the HIP report and associate it with the User-ID information for users on the internal network. This information is then used by the firewall's policy engine when that user's traffic traverses the firewall to access other network segments.

Does Internal Gateway get used to extract HIP which in turn would allow the firewall to enforce access even if the user is not in a full tunnel?

Yes, absolutely. This is a primary use case for Internal Gateways.

A key concept for Internal Gateways is that they facilitate HIP data collection for internal users. This HIP data, linked with User-ID, is then used in security policies that inspect inter-zone traffic within the internal network. A tunnel via the Internal Gateway is not always required for HIP data to be collected and used.

GP Agent Connects (No Tunnel Needed for HIP)

Submits HIP + User-ID

Stores

Accesses Internal Server 10.2.2.10

Checks Policy (Src:UserLAN, Dst:ServerZone, User:UserA, HIP:Compliant)

Allow

User in LAN 10.1.1.5

Internal Gateway

Firewall

User-ID & HIP Cache: Unsupported markdown: link = Compliant

Allow/Deny

Internal Server 10.2.2.10

Internal Gateway HIP collection for non-tunneled traffic enforcement.

Enforcing Restrictions on Internal Resources via Internal Gateways

While an External Gateway typically creates a tunnel through which all (or selected) remote user traffic flows, an Internal Gateway's role in "forcing" traffic for inspection is different.

Can an Internal Gateway be used to force traffic through the firewall like an External Gateway, to enforce restrictions on non-compliant devices accessing resources on the internal network?

Not directly in the same way. An Internal Gateway itself doesn't typically act as a transparent inline device that all internal user traffic must pass through by default. Instead, enforcement on internal resources relies on a combination of factors:

  1. HIP Collection: The user's endpoint (with GlobalProtect agent) connects to the Internal Gateway (or Portal configured for internal use) and submits a HIP report. This establishes the device's compliance status associated with the User-ID.
  2. Network Segmentation & Firewall Policy:
    • The internal network must be segmented into different zones (e.g., User Zone, Server Zone, DMZ).
    • The Palo Alto Networks firewall must be positioned to inspect traffic flowing *between* these internal zones.
    • Security policies are configured on the firewall to control this inter-zone traffic. These policies will use:
      • Source/Destination Zones
      • Source User (via User-ID, which the Internal Gateway helps populate)
      • HIP Profile Match (obtained via the Internal Gateway connection)
      • Application (App-ID)
      • Services, etc.
  3. Traffic Path: For restrictions to be enforced on a non-compliant device accessing an internal resource, the traffic from that device to the resource must traverse the firewall where the HIP-aware security policy is applied.
The Internal Gateway facilitates getting the HIP information. The firewall, using this information along with User-ID and appropriate security policies between internal network segments, enforces the restrictions. The "forcing" of traffic is a result of network architecture (routing traffic through the firewall) rather than a direct action of the Internal Gateway itself compelling all traffic through it like a full tunnel.

Scenario: Internal User Accessing Sensitive HR Server

An internal user ( UserX on IP 192.168.1.50 in VLAN_Users ) tries to access an HR server ( 192.168.10.100 in VLAN_HR_Servers ).

  1. UserX 's GlobalProtect agent is connected to an Internal Gateway, which has collected a HIP report showing their device is "Non-Compliant-PatchMissing". This HIP status is now associated with UserX and 192.168.1.50 .
  2. Traffic from VLAN_Users to VLAN_HR_Servers is routed through the Palo Alto Networks firewall.
  3. A security policy on the firewall for traffic from Zone_Users to Zone_HR requires:
    • User: Any Authenticated User
    • HIP Profile: "Compliant-Device"
    • Action: Allow
  4. Another (more general or preceding deny) policy might implicitly or explicitly deny access if the "Compliant-Device" HIP profile is not matched.
  5. When UserX 's traffic hits the firewall, the policy engine sees that UserX 's device does NOT match the "Compliant-Device" HIP profile.
  6. Access to the HR server is denied based on the HIP check, even though the user is internal. The Internal Gateway enabled the firewall to have this posture information.
Distinguish how External Gateways (often full/split tunnel) and Internal Gateways (HIP collection for on-prem, policy enforcement via inter-zone firewall rules) achieve restriction. Understand that for internal enforcement, the traffic must pass through a firewall policy point that uses the HIP data.

Advanced Use Cases for GlobalProtect HIP

Beyond basic compliant/non-compliant access, HIP can be leveraged for more sophisticated security controls:

Caveats, Gotchas, and Considerations

Implementing GlobalProtect HIP effectively requires awareness of its limitations and potential pitfalls:

Caveats related to content updates, custom check performance, BYOD, and the agent dependency are common exam considerations.

Best Practices for HIP Implementation

Following best practices can help ensure a smooth and effective HIP deployment:

The "Audit First" approach and providing clear user notifications are key operational best practices often highlighted.

PCNSE Exam Focus for GlobalProtect HIP

Based on general PCNSE exam objectives and community feedback, here are areas related to GlobalProtect HIP that are commonly emphasized:

Study Tip: Focus on practical application. Be able to describe how you would configure HIP to check for a specific condition (e.g., "Windows 10 with CrowdStrike AV enabled and definitions newer than 7 days") and then use that in a policy to grant access. Understanding the "why" behind each component is as important as the "how".

Questions might present a scenario and ask you to identify the correct HIP configuration, troubleshooting step, or policy application to achieve a desired security outcome.

GlobalProtect HIP - Interactive Quiz

Test your knowledge on GlobalProtect Host Information Profile (HIP).

1. What is the primary purpose of a Host Information Profile (HIP) in GlobalProtect?

Correct Answer: B
HIP is fundamentally about collecting endpoint security state (posture) to make informed access control decisions.

2. Which two components are directly configured under Objects > GlobalProtect to define what to check and the required state?

Correct Answer: C
HIP Objects define individual attributes to check, and HIP Profiles group these objects to define a compliant or non-compliant state.

3. Where must HIP Data Collection be enabled for it to function correctly?

Correct Answer: D
HIP collection settings are part of the Agent Configuration, which is then applied to Portals (for initial checks/config) and Gateways (for ongoing enforcement).

4. A user's device fails a HIP check due to outdated antivirus signatures. Which PAN-OS feature should be configured to inform the user about this issue and guide remediation?

Correct Answer: A
HIP Notification messages (configured under Device > Response Pages or similar) are designed to inform users about HIP failures and provide remediation steps.

5. In which two types of policies are HIP Profiles primarily used as matching criteria for enforcement?

Correct Answer: C
HIP Profiles are used in the 'User' tab of Security Policies to control traffic access and as match criteria in Authentication Policies to influence authentication requirements (e.g., MFA).

6. Which statement accurately describes the role of an Internal Gateway in HIP enforcement for users on the corporate network not using a full tunnel?

Correct Answer: B
The Internal Gateway helps collect HIP data from on-prem users. This data, combined with User-ID, is then used by the firewall's security policies when traffic from that user traverses different internal network segments.

7. How does GlobalProtect HIP contribute to a Zero Trust Architecture (ZTA)?

Correct Answer: D
ZTA's "never trust, always verify" principle extends to devices. HIP verifies device health, enabling policies that grant access based on this context, thus enforcing least privilege dynamically.

8. What is a significant "gotcha" or caveat when relying on HIP for security?

Correct Answer: A
If the agent is not present, not running, or tampered with, HIP checks cannot be performed or may be unreliable. This is a fundamental dependency.

9. Why is it crucial to keep firewall content definitions (e.g., for Antivirus, Applications and Threats) up-to-date for accurate HIP checks?

Correct Answer: C
The firewall's database of known AV vendors, patch management systems, etc., is updated via content updates. If this database is old, it may not recognize newer compliant software, leading to false negatives in HIP checks.

10. An administrator wants to allow access to sensitive financial applications ONLY if the connecting Windows device has BitLocker disk encryption enabled AND its Symantec Endpoint Protection is running with definitions less than 3 days old. How should this be configured?

Correct Answer: B
Best practice is to define individual conditions in HIP Objects, then combine these objects within a HIP Profile to define the overall required state. This profile is then used in Security or Authentication Policies.

11. During the HIP workflow, which component is typically responsible for the initial HIP check when an agent first connects and for delivering the agent configuration?

Correct Answer: D
The GlobalProtect Portal typically handles the initial agent connection, authentication, optional initial HIP check, and delivery of the agent configuration (which includes the list of gateways).

12. What is a recommended first step when rolling out new, stricter HIP enforcement policies?

Correct Answer: A
Starting with an audit phase (allowing traffic but logging HIP matches/mismatches) helps understand the compliance landscape and avoid widespread disruption before enforcing blocking rules.

13. If a GlobalProtect agent periodically re-submits its HIP report to the Gateway and the device's posture changes from compliant to non-compliant, what can happen?

Correct Answer: C
Periodic HIP re-submission allows for dynamic policy enforcement. If a device's state changes, the Gateway can update its access rights based on security policies that match the new HIP status.

14. A "Custom Check" HIP Object for Windows endpoints can be configured to look for which of the following? (Select the most comprehensive answer)

Correct Answer: B
Custom Checks for Windows can verify the existence/properties of files, registry keys/values, and specific running processes. OS version is a standard, non-custom check.

15. When an External Gateway is configured for split tunneling, how does HIP enforcement apply?

Correct Answer: D
In a split tunnel setup, the gateway can only enforce HIP on the traffic it actually inspects (i.e., traffic sent through the tunnel).

16. What information is primarily found in the Monitor > Logs > HIP Match log?

Correct Answer: A
The HIP Match log specifically records the results of HIP evaluations, showing which HIP objects/profiles were matched or not by each endpoint submitting a HIP report.

17. For an Internal Gateway to enable HIP-based restrictions on an internal user accessing a server in a different internal zone, which of the following is essential?

Correct Answer: C
The Internal Gateway collects HIP. For enforcement on internal traffic, that traffic must actually traverse the firewall, allowing the security policy engine to use the collected User-ID and HIP data.

18. You need to ensure that only corporate-managed laptops, identified by the presence of a specific registry key ( HKLM\Software\CorpIT\ManagedAsset = True ), can access the VPN. What's the most direct way to achieve this using HIP?

Correct Answer: B
Checking for a specific registry key requires a Custom Check HIP Object. This object would then be included in a HIP Profile that defines "Corporate-Managed Laptop," which is then used in a security policy.

19. What is a potential challenge when implementing strict HIP checks for Bring Your Own Devices (BYOD)?

Correct Answer: D
Organizations have less control over personal devices, leading to challenges in enforcing strict security postures due to privacy considerations and the inability to mandate certain software or configurations.

20. An advanced use case for HIP in Authentication Policies is to:

Correct Answer: A
Authentication Policies can use HIP Profiles as match criteria to determine the authentication requirements, such as enforcing MFA for devices that are not fully compliant or are BYOD, while potentially allowing password-only for highly trusted corporate devices.