A Host Information Profile (HIP), often referred to simply as "HIP Check", is a dynamic security posture assessment feature within Palo Alto Networks GlobalProtect. The GlobalProtect agent running on an endpoint (laptop, mobile device) collects information about the host's state – such as operating system version, patch level, antivirus status, disk encryption, running processes, registry keys, etc.
This collected information forms a HIP report , which is sent to the GlobalProtect Portal and/or Gateway. The firewall then compares this report against predefined HIP Profiles to determine if the endpoint meets the organization's security requirements.
The result of this comparison ( HIP match or HIP mismatch ) can then be used as a matching criterion in Security and Authentication policies to enforce granular access control based not just on user identity, but also on the security posture and compliance of the connecting device .
Objects > GlobalProtect > HIP Objects
Objects > GlobalProtect > HIP Profiles
Network > GlobalProtect > Portals > [Portal Name] > Agent > [Agent Config] > Data Collection
Tab -> Check 'Enable'.
Network > GlobalProtect > Gateways > [Gateway Name] > Agent > Data Collection
Tab -> Check 'Enable'.
Device > Response Pages > GlobalProtect Clientless VPN
or similar based on version/context) Customize messages shown to users whose devices fail HIP checks.
Policies > Security
) Add a HIP Profile in the 'User' tab.
Device > Authentication Policy
) Add a HIP Profile as Match Criteria.
sequenceDiagram
participant Client as GP Agent
participant Portal as GP Portal
participant Gateway as GP Gateway
participant PolicyEngine as Firewall Policy Engine
Client->>+Portal: 1. Connect & Authenticate
Portal-->>Client: 2. Request HIP Report (if enabled)
Client->>Client: 3. Collect Host Information (based on config)
Client->>+Portal: 4. Submit HIP Report
Portal->>Portal: 5. Evaluate Report vs HIP Profiles
Note over Portal: HIP Profile Match/Mismatch Determined
alt Portal Enforces HIP Check
Portal-->>Client: 6a. Grant/Deny Config based on HIP Match
else Portal Collects Only
Portal-->>Client: 6b. Provide Config (incl. Gateway List)
end
deactivate Portal
Client->>+Gateway: 7. Connect & Authenticate
Gateway-->>Client: 8. Request HIP Report (if enabled)
Client->>+Gateway: 9. Submit HIP Report
Gateway->>+PolicyEngine: 10. Evaluate Report vs HIP Profiles
PolicyEngine-->>Gateway: 11. HIP Profile Match/Mismatch Result
Gateway->>+PolicyEngine: 12. Use HIP Match in Policy Evaluation
alt Security/Auth Policy Requires HIP Match
PolicyEngine-->>Gateway: 13a. Policy Match Success/Failure
Gateway-->>Client: 14a. Grant/Deny Access based on Policy
else Policy Doesn't Require HIP
PolicyEngine-->>Gateway: 13b. Policy Match based on other criteria
Gateway-->>Client: 14b. Grant/Deny Access based on Policy
end
deactivate PolicyEngine
deactivate Gateway
Note over Client, Gateway: Periodic HIP Re-submissions occur
Zero Trust is a security model based on the principle of "never trust, always verify." It assumes that threats can exist both outside and inside the traditional network perimeter. Access decisions should be granular and enforced based on verified identity and context, not just network location. GlobalProtect HIP is a cornerstone technology for implementing ZTA for remote and internal access:
1. Verifying Device Trust ("Always Verify"):
2. Enforcing Least Privilege Access:
3. Dynamic and Context-Aware Access Control:
4. Reducing the Attack Surface:
In a Zero Trust architecture, HIP complements strong user authentication (like MFA via SAML integration) and granular App-ID based policies to create a robust access control model based on verified user identity, verified device health, and allowed application usage.
For the PCNSE exam, related to HIP:
Objects > GlobalProtect
).
1. What is the primary function of a GlobalProtect Host Information Profile (HIP) Profile?
2. Which PAN-OS component collects the host information from the endpoint device?
3. Where must HIP data collection be enabled for the firewall (Portal/Gateway) to receive HIP reports from the agent?
4. In which two main policy types can a HIP Profile match be used as a criterion for enforcement?
5. How does using HIP Profiles align with the Zero Trust principle of "Never Trust, Always Verify"?
6. An administrator wants to ensure that only devices with disk encryption enabled using BitLocker can access sensitive resources. Which two components are essential?
7. What is a potential "gotcha" or challenge when implementing HIP checks?
8. How can HIP Profiles be used to enforce least privilege access?
9. Where are HIP Objects configured in the PAN-OS GUI?
10. What mechanism allows the firewall to dynamically update access based on changes in endpoint posture after the initial connection?