Gain Visibility into remote clients by using HIP profiles in Security policies. Join Bryan Hadzik and Robert Kemeny as we dive into our September Fall Training Series with Palo Alto Networks recorded Friday, September 29th at 12:30pm EST/9:30am PST.
Ensure that your remote devices are in compliance with corporate security requirements in order to receive the configuration profiles that enable access to your corporate resources.
We’ll run through implementing examples like this:
Before pushing configurations that enable access to your corporate systems, you will want to ensure that the device data is encrypted and that the devices have AV and are up to date. To do this, we will create a HIP profile that matches devices that meet this criteria and attach it to your security policy rules.
Less PowerPoint, more Demo
This is not a sales presentation. It’s a hands-on training webcast – part of our ongoing (no-charge) training series, a benefit of being an NCSi customer. Not an NCSi customer yet? Not to worry, join us for the webcast and see the NSCi advantages here.
- September 29, 2017 - November 1, 2018