PAN-OS: GlobalProtect Device Quarantine - Detailed Guide

GlobalProtect makes it easier for you to block compromised devices from your network by identifying a compromised device with its Host ID and, optionally, serial number instead of its source IP address. This ability can be preferable to blocking a compromised endpoint from a network based on its IP address, because if a device’s IP address changes (for example, if a user moves their endpoint from a work location to their home), security policies based on IP addresses could allow the endpoint back on the network.

After you identify a device as compromised (for example, if a device has been infected with malware and is performing command and control actions), you can manually add the device’s Host ID to a quarantine list and configure GlobalProtect to prevent users from connecting to the GlobalProtect gateway from a quarantined device. You can also automatically quarantine the device using log forwarding profiles with security policies or HIP Match log settings .

Starting with Android 8.0 version, GlobalProtect app is unable to retrieve device serial number as GlobalProtect app is not device owner app or profile owner app. In this case, you can use ANDROID_ID as the device serial number. ANDROID_ID is application specific on an Android device and the ID may change when resetting your Android device to factory settings.

Prerequisites & Licensing

Before you begin to quarantine devices, make sure that your GlobalProtect users are running a minimum GlobalProtect app version of 5.1 (introduced PAN-OS 10.0, feature expanded in 10.2). In addition, make sure that a valid GlobalProtect subscription license is present on the firewall performing the quarantine action (adding devices to the list). The license requirements are enforced as follows:

View Quarantined Device Information

You view quarantined device information from the Device Quarantine page:

Device Quarantine List View in PAN-OS GUI

Export option on Device Quarantine page

Manually Add and Delete Devices From the Quarantine List

You can add a device manually from the quarantine page, from specific logs, or via the API. Deletion is done from the quarantine page.

Host ID Values by OS:

Automatically Quarantine a Device

Automation uses Log Forwarding Profiles or HIP Match Log Settings.

Use GlobalProtect and Security Policies to Block Access

Once a device is quarantined, you block its access:

Redistribute Device Quarantine Information from Panorama

Panorama can act as a central repository for the quarantine list and distribute it to managed firewalls using User-ID Redistribution.

  1. Enable User-ID on Panorama Interface: Ensure User-ID redistribution is enabled on the Panorama interface used to communicate with redistribution agents ( Device > Setup > Interfaces > Management or a dataplane interface via Network > Interface Mgmt ).

    Enable User-ID Service on Management Interface

    Enable User-ID Service in Interface Management Profile

  2. Configure Data Redistribution Agent:
    • Go to Panorama > Data Redistribution .
    • Click Add to create an agent configuration.
    • Specify the managed firewalls/gateways (Servers) that should receive the data.
    • Under Data Type , select Quarantine List .

      Data Redistribution Agent configuration in Panorama selecting Quarantine List

  3. Commit changes to Panorama and push to relevant Device Groups.

Visual Flows: Device Quarantine

Flow 1: Automatic Quarantine via Logs

sequenceDiagram
    participant Device as Device (GP Agent)
    participant FW_Pano as Firewall/Panorama (Policy & List Mgmt)
    participant GP_GW as GlobalProtect Gateway

    Note over Device, FW_Pano: Initial State: Device is NOT Quarantined

    Device->>+FW_Pano: Sends traffic triggering policy/threat (e.g., malware detected)
    FW_Pano->>FW_Pano: Generate Log (e.g., Threat Log) containing Source Host ID
    Note over FW_Pano: Log is forwarded/evaluated based on Log Forwarding Profile or Log Setting
    FW_Pano->>FW_Pano: Filter defined in Profile/Setting Matches Criteria
    FW_Pano->>FW_Pano: Execute Built-in Action: Add Host ID to Device Quarantine List
    Note over FW_Pano: Device is now marked as Quarantined internally
    deactivate FW_Pano

    Note over Device, GP_GW: Later... Device attempts VPN connection

    Device->>+GP_GW: Initiate GlobalProtect Connection (Sends Host ID)
    GP_GW->>GP_GW: Receive connection request & Host ID
    Note over GP_GW: Check Gateway Config: "Block login for quarantined devices" is Enabled
    GP_GW->>GP_GW: Check received Host ID against Quarantine List
    alt Host ID Found in Quarantine List
        GP_GW-->>-Device: Block Connection (Device Quarantined Notification)
    else Host ID NOT Found
        GP_GW->>Device: Proceed with normal Authentication/Connection (if other checks pass)
    end

                

Flow 2: Manual Quarantine by Administrator

sequenceDiagram
    participant Admin
    participant Device as Device (GP Agent)
    participant FW_Pano as Firewall/Panorama (Policy & List Mgmt)
    participant GP_GW as GlobalProtect Gateway

    Note over Admin, FW_Pano: Admin identifies problematic device & obtains Host ID

    Admin->>+FW_Pano: Manually Add Host ID to Device Quarantine List (GUI/CLI/API)
    FW_Pano-->>Admin: Confirm Host ID added
    deactivate FW_Pano
    Note over FW_Pano: Device is now marked as Quarantined

    Note over Device, GP_GW: Later... Device attempts VPN connection

    Device->>+GP_GW: Initiate GlobalProtect Connection (Sends Host ID)
    GP_GW->>GP_GW: Receive connection request & Host ID
    Note over GP_GW: Check Gateway Config: "Block login for quarantined devices" is Enabled
    GP_GW->>GP_GW: Check received Host ID against Quarantine List
    alt Host ID Found in Quarantine List
        GP_GW-->>-Device: Block Connection (Device Quarantined Notification)
    else Host ID NOT Found
        GP_GW->>Device: Proceed with normal Authentication/Connection
    end

                

Device Quarantine Quiz (10 Questions)

1. What is the minimum PAN-OS version required for the native GlobalProtect Device Quarantine feature?

2. What specific identifier is used by GlobalProtect to uniquely identify a device for quarantine?

3. Which component configuration directly blocks a quarantined device from establishing a GlobalProtect VPN connection?

4. Which of these is NOT a valid method mentioned for manually adding a device to the quarantine list?

5. To automate quarantine based on Threat logs, which Built-in Action should be configured in the Log Forwarding Profile Match List?

6. What is required for the firewall to include the Host ID in Threat or Traffic logs for potential quarantine automation?

7. Which log type settings can be used to directly trigger the Quarantine Built-in Action without needing assignment to a Security Policy rule?

8. What is required to automatically remove a device from quarantine after a certain time?

9. What Panorama feature is used to distribute the central quarantine list to managed firewalls?

10. Which license is explicitly required on the firewall to *add* devices (manually or automatically) to the quarantine list?