PAN-OS: GlobalProtect Host Information Profile (HIP) & Zero Trust Access

What is a Host Information Profile (HIP)?

A Host Information Profile (HIP), often referred to simply as "HIP Check", is a dynamic security posture assessment feature within Palo Alto Networks GlobalProtect. The GlobalProtect agent running on an endpoint (laptop, mobile device) collects information about the host's state – such as operating system version, patch level, antivirus status, disk encryption, running processes, registry keys, etc.

This collected information forms a HIP report , which is sent to the GlobalProtect Portal and/or Gateway. The firewall then compares this report against predefined HIP Profiles to determine if the endpoint meets the organization's security requirements.

The result of this comparison ( HIP match or HIP mismatch ) can then be used as a matching criterion in Security and Authentication policies to enforce granular access control based not just on user identity, but also on the security posture and compliance of the connecting device .

Core Components of HIP Configuration

  1. HIP Objects: Defining *What* to Collect

    • Purpose: Define the specific attributes or conditions the GlobalProtect agent should check for on the endpoint.
    • Location: Objects > GlobalProtect > HIP Objects
    • Examples of Attributes:
      • General: Operating System (e.g., Windows 10 build 22H2, macOS Ventura), Hostname, Domain.
      • Anti-Malware: Specific vendor (e.g., CrowdStrike, Defender), Real-time protection enabled, Signature version within X days.
      • Disk Encryption: Specific vendor (e.g., BitLocker, FileVault), Encryption state (Full Volume Encrypted).
      • Patch Management: Specific vendor (e.g., Microsoft SCCM, JAMF), Agent installed, Last check-in time.
      • Firewall: Specific vendor (e.g., Windows Firewall, macOS Firewall), Enabled state.
      • Data Loss Prevention (DLP): Agent installed/running.
      • Disk Backup: Agent installed/running, Last backup status.
      • Custom Checks: Check for specific files, registry keys (Windows), Plist files (macOS), running processes. Use with caution due to potential performance/privacy implications.
    • Multiple conditions can be combined within a single HIP Object using AND/OR logic.
  2. HIP Profiles: Defining the *Required State*

    • Purpose: Define the required security posture by referencing one or more HIP Objects. It determines if a device is considered "compliant", "non-compliant", or matches some other defined state.
    • Location: Objects > GlobalProtect > HIP Profiles
    • Configuration:
      • Select HIP Objects created in the previous step.
      • Use Match/Exclude logic (e.g., "Match if OS is Windows 10 AND Anti-Malware state is Enabled", "Exclude if Disk Encryption state is Not Encrypted").
      • Combine multiple criteria using AND/OR logic.
      • Common Profiles: `Compliant-Device`, `Non-Compliant-Device`, `Corporate-Managed`, `BYOD-Basic-Checks`.
  3. Enabling HIP Collection & Usage:

    • Portal/Gateway Agent Config: HIP data collection must be explicitly enabled.
      • Go to Network > GlobalProtect > Portals > [Portal Name] > Agent > [Agent Config] > Data Collection Tab -> Check 'Enable'.
      • Go to Network > GlobalProtect > Gateways > [Gateway Name] > Agent > Data Collection Tab -> Check 'Enable'.
    • HIP Notification Messages (Optional): ( Device > Response Pages > GlobalProtect Clientless VPN or similar based on version/context) Customize messages shown to users whose devices fail HIP checks.
    • Policy Enforcement: Use the created HIP Profiles as matching criteria in:
      • Security Policy Rules: ( Policies > Security ) Add a HIP Profile in the 'User' tab.
      • Authentication Policy Rules: ( Device > Authentication Policy ) Add a HIP Profile as Match Criteria.

How HIP Works: The Workflow

sequenceDiagram
    participant Client as GP Agent
    participant Portal as GP Portal
    participant Gateway as GP Gateway
    participant PolicyEngine as Firewall Policy Engine

    Client->>+Portal: 1. Connect & Authenticate
    Portal-->>Client: 2. Request HIP Report (if enabled)
    Client->>Client: 3. Collect Host Information (based on config)
    Client->>+Portal: 4. Submit HIP Report
    Portal->>Portal: 5. Evaluate Report vs HIP Profiles
    Note over Portal: HIP Profile Match/Mismatch Determined
    alt Portal Enforces HIP Check
        Portal-->>Client: 6a. Grant/Deny Config based on HIP Match
    else Portal Collects Only
         Portal-->>Client: 6b. Provide Config (incl. Gateway List)
    end
    deactivate Portal

    Client->>+Gateway: 7. Connect & Authenticate
    Gateway-->>Client: 8. Request HIP Report (if enabled)
    Client->>+Gateway: 9. Submit HIP Report
    Gateway->>+PolicyEngine: 10. Evaluate Report vs HIP Profiles
    PolicyEngine-->>Gateway: 11. HIP Profile Match/Mismatch Result
    Gateway->>+PolicyEngine: 12. Use HIP Match in Policy Evaluation
    alt Security/Auth Policy Requires HIP Match
        PolicyEngine-->>Gateway: 13a. Policy Match Success/Failure
        Gateway-->>Client: 14a. Grant/Deny Access based on Policy
    else Policy Doesn't Require HIP
        PolicyEngine-->>Gateway: 13b. Policy Match based on other criteria
        Gateway-->>Client: 14b. Grant/Deny Access based on Policy
    end
    deactivate PolicyEngine
    deactivate Gateway

    Note over Client, Gateway: Periodic HIP Re-submissions occur

    
  1. The GlobalProtect agent connects to the Portal and authenticates the user.
  2. If HIP data collection is enabled in the Portal's agent configuration, the Portal requests a HIP report.
  3. The agent scans the endpoint based on the HIP Objects defined in the configuration received from the Portal.
  4. The agent sends the HIP report (a summary of its findings) back to the Portal.
  5. The Portal evaluates the report against its configured HIP Profiles. (Optional) The Portal can be configured to deny configuration delivery if the device doesn't meet certain HIP criteria at this stage.
  6. The agent receives its configuration, including the list of Gateways.
  7. The agent connects to the selected Gateway and authenticates (potentially using cookies or re-authenticating).
  8. If HIP data collection is enabled on the Gateway, it requests a HIP report from the agent.
  9. The agent sends the current HIP report to the Gateway.
  10. The Gateway evaluates the report against its configured HIP Profiles.
  11. When user traffic arrives through the tunnel, the firewall's Policy Engine uses the HIP Profile match status (along with User-ID, App-ID, Zones, Addresses, etc.) as criteria in Security and Authentication Policy rules.
  12. Access is granted or denied based on the policy match, which now includes the device's security posture via the HIP Profile.
  13. The agent periodically re-submits HIP reports to the Gateway, allowing for continuous posture assessment.

How HIP Enables Zero Trust Access (ZTA)

Zero Trust is a security model based on the principle of "never trust, always verify." It assumes that threats can exist both outside and inside the traditional network perimeter. Access decisions should be granular and enforced based on verified identity and context, not just network location. GlobalProtect HIP is a cornerstone technology for implementing ZTA for remote and internal access:

In a Zero Trust architecture, HIP complements strong user authentication (like MFA via SAML integration) and granular App-ID based policies to create a robust access control model based on verified user identity, verified device health, and allowed application usage.

Caveats, Gotchas, and Considerations

Best Practices for HIP Implementation

PCNSE Exam Focus

For the PCNSE exam, related to HIP:

GlobalProtect HIP Quiz

1. What is the primary function of a GlobalProtect Host Information Profile (HIP) Profile?

HIP Profiles (Objects > GlobalProtect > HIP Profiles) use HIP Objects as criteria to define a compliant or non-compliant state. They evaluate the report, while HIP Objects define what data is in the report.

2. Which PAN-OS component collects the host information from the endpoint device?

The GlobalProtect Agent software installed on the endpoint (laptop, mobile) is responsible for scanning the device and collecting the attributes defined by HIP Objects.

3. Where must HIP data collection be enabled for the firewall (Portal/Gateway) to receive HIP reports from the agent?

HIP data collection is enabled within the Agent Configuration section of both the Portal (Network > GlobalProtect > Portals > Agent > Data Collection) and Gateway (Network > GlobalProtect > Gateways > Agent > Data Collection) settings.

4. In which two main policy types can a HIP Profile match be used as a criterion for enforcement?

HIP Profile match results are primarily used as matching criteria within Security Policy rules (to allow/deny traffic based on posture) and Authentication Policy rules (to influence authentication steps based on posture).

5. How does using HIP Profiles align with the Zero Trust principle of "Never Trust, Always Verify"?

Zero Trust requires verification of all access components. HIP adds the critical device verification layer, ensuring that even authenticated users cannot gain access if their device is unhealthy or non-compliant.

6. An administrator wants to ensure that only devices with disk encryption enabled using BitLocker can access sensitive resources. Which two components are essential?

You first define *what* to check (BitLocker status) using a HIP Object. Then you define the *required state* (BitLocker must be enabled) using a HIP Profile referencing that object. Finally, you enforce access using that HIP Profile in a Security Policy rule.

7. What is a potential "gotcha" or challenge when implementing HIP checks?

The firewall compares the agent's report against its own definitions. If the firewall's definitions for AV products, patch systems, etc., are outdated (due to missed content updates), it may incorrectly flag a compliant device as non-compliant, or vice-versa.

8. How can HIP Profiles be used to enforce least privilege access?

Least privilege in this context means granting access based on need *and* verified trust. By mapping different compliance levels (via HIP Profiles) to different Security rules, you can ensure non-compliant devices have restricted access compared to fully compliant ones.

9. Where are HIP Objects configured in the PAN-OS GUI?

Both HIP Objects (defining what to check) and HIP Profiles (defining the required state) are configured under the `Objects > GlobalProtect` section of the GUI.

10. What mechanism allows the firewall to dynamically update access based on changes in endpoint posture after the initial connection?

The GlobalProtect agent periodically sends updated HIP reports to the gateway. The gateway re-evaluates these reports against HIP Profiles, allowing policies to adapt dynamically if the device's compliance state changes. This enables continuous verification.

References