A Host Information Profile (HIP), often referred to simply as "HIP Check", is a dynamic security posture assessment feature within Palo Alto Networks GlobalProtect. The GlobalProtect agent running on an endpoint (laptop, mobile device) collects information about the host's state – such as operating system version, patch level, antivirus status, disk encryption, running processes, registry keys, etc.
This collected information forms a HIP report , which is sent to the GlobalProtect Portal and/or Gateway. The firewall then compares this report against predefined HIP Profiles to determine if the endpoint meets the organization's security requirements.
The result of this comparison ( HIP match or HIP mismatch ) can then be used as a matching criterion in Security and Authentication policies to enforce granular access control based not just on user identity, but also on the security posture and compliance of the connecting device .
Objects > GlobalProtect > HIP Objects
Objects > GlobalProtect > HIP Profiles
Network > GlobalProtect > Portals > [Portal Name] > Agent > [Agent Config] > Data Collection
Tab -> Check 'Enable'.
Network > GlobalProtect > Gateways > [Gateway Name] > Agent > Data Collection
Tab -> Check 'Enable'.
Device > Response Pages > GlobalProtect Clientless VPN
or similar based on version/context) Customize messages shown to users whose devices fail HIP checks.
Policies > Security
) Add a HIP Profile in the 'User' tab.
Device > Authentication Policy
) Add a HIP Profile as Match Criteria.
sequenceDiagram participant Client as GP Agent participant Portal as GP Portal participant Gateway as GP Gateway participant PolicyEngine as Firewall Policy Engine Client->>+Portal: 1. Connect & Authenticate Portal-->>Client: 2. Request HIP Report (if enabled) Client->>Client: 3. Collect Host Information (based on config) Client->>+Portal: 4. Submit HIP Report Portal->>Portal: 5. Evaluate Report vs HIP Profiles Note over Portal: HIP Profile Match/Mismatch Determined alt Portal Enforces HIP Check Portal-->>Client: 6a. Grant/Deny Config based on HIP Match else Portal Collects Only Portal-->>Client: 6b. Provide Config (incl. Gateway List) end deactivate Portal Client->>+Gateway: 7. Connect & Authenticate Gateway-->>Client: 8. Request HIP Report (if enabled) Client->>+Gateway: 9. Submit HIP Report Gateway->>+PolicyEngine: 10. Evaluate Report vs HIP Profiles PolicyEngine-->>Gateway: 11. HIP Profile Match/Mismatch Result Gateway->>+PolicyEngine: 12. Use HIP Match in Policy Evaluation alt Security/Auth Policy Requires HIP Match PolicyEngine-->>Gateway: 13a. Policy Match Success/Failure Gateway-->>Client: 14a. Grant/Deny Access based on Policy else Policy Doesn't Require HIP PolicyEngine-->>Gateway: 13b. Policy Match based on other criteria Gateway-->>Client: 14b. Grant/Deny Access based on Policy end deactivate PolicyEngine deactivate Gateway Note over Client, Gateway: Periodic HIP Re-submissions occur
Zero Trust is a security model based on the principle of "never trust, always verify." It assumes that threats can exist both outside and inside the traditional network perimeter. Access decisions should be granular and enforced based on verified identity and context, not just network location. GlobalProtect HIP is a cornerstone technology for implementing ZTA for remote and internal access:
1. Verifying Device Trust ("Always Verify"):
2. Enforcing Least Privilege Access:
3. Dynamic and Context-Aware Access Control:
4. Reducing the Attack Surface:
In a Zero Trust architecture, HIP complements strong user authentication (like MFA via SAML integration) and granular App-ID based policies to create a robust access control model based on verified user identity, verified device health, and allowed application usage.
For the PCNSE exam, related to HIP:
Objects > GlobalProtect
).
1. What is the primary function of a GlobalProtect Host Information Profile (HIP) Profile?
2. Which PAN-OS component collects the host information from the endpoint device?
3. Where must HIP data collection be enabled for the firewall (Portal/Gateway) to receive HIP reports from the agent?
4. In which two main policy types can a HIP Profile match be used as a criterion for enforcement?
5. How does using HIP Profiles align with the Zero Trust principle of "Never Trust, Always Verify"?
6. An administrator wants to ensure that only devices with disk encryption enabled using BitLocker can access sensitive resources. Which two components are essential?
7. What is a potential "gotcha" or challenge when implementing HIP checks?
8. How can HIP Profiles be used to enforce least privilege access?
9. Where are HIP Objects configured in the PAN-OS GUI?
10. What mechanism allows the firewall to dynamically update access based on changes in endpoint posture after the initial connection?