Important note about SSL VPN compatibility for 20.0 MR1 with EoL SFOS versions and UTM9 OS. Learn more in the release notes.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Security policy for hosts

Is there any way to create a policy so hosts that are not in compliance cannot access the internal network?

Example: If the host does not have AV and CrowdStrike installed and active, access to the internal network or VPN is not allowed, therefore, the firewall blocks authentication and traffic.
Something similar to the host information profile (HIP) from GlobalProtection (Palo Alto).



This thread was automatically locked due to age.