GlobalProtect makes it easier for you to block compromised devices from your network by identifying a compromised device with its Host ID and, optionally, serial number instead of its source IP address. This ability can be preferable to blocking a compromised endpoint from a network based on its IP address, because if a device’s IP address changes (for example, if a user moves their endpoint from a work location to their home), security policies based on IP addresses could allow the endpoint back on the network.
After you identify a device as compromised (for example, if a device has been infected with malware and is performing command and control actions), you can manually add the device’s Host ID to a quarantine list and configure GlobalProtect to prevent users from connecting to the GlobalProtect gateway from a quarantined device. You can also automatically quarantine the device using log forwarding profiles with security policies or HIP Match log settings .
Starting with Android 8.0 version, GlobalProtect app is unable to retrieve device serial number as GlobalProtect app is not device owner app or profile owner app. In this case, you can use ANDROID_ID as the device serial number. ANDROID_ID is application specific on an Android device and the ID may change when resetting your Android device to factory settings.
Before you begin to quarantine devices, make sure that your GlobalProtect users are running a minimum GlobalProtect app version of 5.1 (introduced PAN-OS 10.0, feature expanded in 10.2). In addition, make sure that a valid GlobalProtect subscription license is present on the firewall performing the quarantine action (adding devices to the list). The license requirements are enforced as follows:
You view quarantined device information from the Device Quarantine page:
Device > Device Quarantine
.
Panorama > Device Quarantine
.
You can add a device manually from the quarantine page, from specific logs, or via the API. Deletion is done from the quarantine page.
Device > Device Quarantine
(or
Panorama > Device Quarantine
) and click
Add
. Enter the
Host ID
and optionally the
Serial Number
.
Monitor > Logs
).
Monitor > Logs > HIP Match
). Filter for the user, open a log entry, and find the Host ID under
OS > Host ID
.
Device Quarantine
page and click
Delete
. This is typically done after remediation.
HKEY_Local_Machine\Software\Microsoft\Cryptography\MachineGuid
)
Automation uses Log Forwarding Profiles or HIP Match Log Settings.
Objects > Log Forwarding
and Add/Edit a profile.
(severity eq critical)
for Threat logs).
Remember, if using Threat or Traffic logs, the Host ID must be present (requires the Security Policy rule with Quarantine as Source Device, mentioned earlier).
Device > Log Settings > HIP Match
and Add/Edit a setting.
Once a device is quarantined, you block its access:
Network > GlobalProtect > Gateways > [Your Gateway] > Agent > Client Settings > [Your Config] > Data Collection
.
Policies > Security
).
Panorama can act as a central repository for the quarantine list and distribute it to managed firewalls using User-ID Redistribution.
Device > Setup > Interfaces > Management
or a dataplane interface via
Network > Interface Mgmt
).
Panorama > Data Redistribution
.
sequenceDiagram participant Device as Device (GP Agent) participant FW_Pano as Firewall/Panorama (Policy & List Mgmt) participant GP_GW as GlobalProtect Gateway Note over Device, FW_Pano: Initial State: Device is NOT Quarantined Device->>+FW_Pano: Sends traffic triggering policy/threat (e.g., malware detected) FW_Pano->>FW_Pano: Generate Log (e.g., Threat Log) containing Source Host ID Note over FW_Pano: Log is forwarded/evaluated based on Log Forwarding Profile or Log Setting FW_Pano->>FW_Pano: Filter defined in Profile/Setting Matches Criteria FW_Pano->>FW_Pano: Execute Built-in Action: Add Host ID to Device Quarantine List Note over FW_Pano: Device is now marked as Quarantined internally deactivate FW_Pano Note over Device, GP_GW: Later... Device attempts VPN connection Device->>+GP_GW: Initiate GlobalProtect Connection (Sends Host ID) GP_GW->>GP_GW: Receive connection request & Host ID Note over GP_GW: Check Gateway Config: "Block login for quarantined devices" is Enabled GP_GW->>GP_GW: Check received Host ID against Quarantine List alt Host ID Found in Quarantine List GP_GW-->>-Device: Block Connection (Device Quarantined Notification) else Host ID NOT Found GP_GW->>Device: Proceed with normal Authentication/Connection (if other checks pass) end
sequenceDiagram participant Admin participant Device as Device (GP Agent) participant FW_Pano as Firewall/Panorama (Policy & List Mgmt) participant GP_GW as GlobalProtect Gateway Note over Admin, FW_Pano: Admin identifies problematic device & obtains Host ID Admin->>+FW_Pano: Manually Add Host ID to Device Quarantine List (GUI/CLI/API) FW_Pano-->>Admin: Confirm Host ID added deactivate FW_Pano Note over FW_Pano: Device is now marked as Quarantined Note over Device, GP_GW: Later... Device attempts VPN connection Device->>+GP_GW: Initiate GlobalProtect Connection (Sends Host ID) GP_GW->>GP_GW: Receive connection request & Host ID Note over GP_GW: Check Gateway Config: "Block login for quarantined devices" is Enabled GP_GW->>GP_GW: Check received Host ID against Quarantine List alt Host ID Found in Quarantine List GP_GW-->>-Device: Block Connection (Device Quarantined Notification) else Host ID NOT Found GP_GW->>Device: Proceed with normal Authentication/Connection end