{"id":994,"date":"2013-12-15T17:31:42","date_gmt":"2013-12-15T17:31:42","guid":{"rendered":"http:\/\/emtunc.org\/blog\/?p=994"},"modified":"2013-12-15T17:33:02","modified_gmt":"2013-12-15T17:33:02","slug":"what-juniper-host-checker-rules-and-policies-should-you-implement","status":"publish","type":"post","link":"https:\/\/emtunc.org\/blog\/12\/2013\/what-juniper-host-checker-rules-and-policies-should-you-implement\/","title":{"rendered":"What Juniper Host Checker Rules and Policies Should You Implement?"},"content":{"rendered":"<p>The Juniper MAG series presents very powerful and flexible configurations for remote access users.<\/p>\n<p>One of these configurations is the Host Checker which is what I will be briefly discussing today.<\/p>\n<p>The Host Checker is a component which, according to the Juniper documentation, <em>&#8220;is a client-side agent that performs endpoint checks on hosts that<\/em><br \/>\n<em>connect to the IVE. You can invoke Host Checker before displaying an IVE sign-in<\/em><br \/>\n<em>page to a user and when evaluating a role mapping rule or resource policy&#8221;<\/em><\/p>\n<p><!--more--><\/p>\n<p>What this basically means is that you can control <em>which<\/em> machines and devices (it can also host check mobile devices &#8211; for example, is this iPhone jailbroken?) along with exactly the configuration you want those machines to have are able to connect to your network.<\/p>\n<p>You can also be a lot more granular and decide that actually, if this machine does not meet our security policy requirements, we will still allow you to have <em>some<\/em> very <em>limited<\/em> access to company resources &#8211; such as allowing a web interface only access to OWA but nothing else.<\/p>\n<p>Below is my brief advice on the types of Host Checker policies an organisation with decent security policies in place <em>should<\/em> enforce &#8211; your requirements and internal policies will probably differ slightly but this should at least get you started and become familiar with the configuration.<\/p>\n<p>The Host Checker configuration can be found under the Authentication &#8211;&gt; Endpoint Security &#8211;&gt; Host Checker menu in the administrator web interface.<\/p>\n<p>Here you can create a new policy and rules within that policy.<\/p>\n<p>So for example, I created two policies &#8211; one which checks that the machine is running a company supported antivirus+firewall and the other policy checks that the machine is actually a domain machine (you don&#8217;t really want to give an employee full access to the network if they are trying to access it from their personal machine which is not part of your AD domain).<\/p>\n<p>For the endpoint security policy, the rule I selected was <em>Predefined: Antivirus<\/em> &#8211; here I selected the products which we support (<em>Require specific products\/vendors<\/em> option) and selected the option to check the AV definitions weren&#8217;t older than <em>x<\/em> days.<br \/>\nThe remediation options allow the Host Checker to automatically try and &#8216;fix&#8217; the issues in order to allow access to the user &#8211; for example &#8211; if the definitions are too old, the Host Checker will try to download the latest definitions.<\/p>\n<p>To check a machine is on the domain, I simply followed the instructions in <a title=\"[SSL VPN] How to enforce domain membership with Host Checker Policy \" href=\"https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;id=KB17389\" target=\"_blank\">this KB article<\/a> (https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;id=KB17389).<\/p>\n<p>You may need to make multiple rules if you have different OS&#8217;s and multiple architecture types (32bit vs 64bit).<\/p>\n<p>After you have configured the policies and rules you want, you must decide whether you want to apply to these Host Checker policies on an entire <em>User Realm<\/em> or <em>User Role<\/em> level.<\/p>\n<p>If you select a realm, click the Authentication &#8211;&gt; Host Checker tab.<br \/>\nIf you select a role, click the General &#8211;&gt; Restrictions &#8211;&gt; Host Checker tab<\/p>\n<p>At the realm level you will get options to either evaluate or enforce. Evaluate will basically run the Host Checker on the machine and log the results but it won&#8217;t stop the user from accessing the network\/resources if they don&#8217;t meet the policy. Enforce will, as the name suggests, enforce the policy so if the user doesn&#8217;t meet the requirements, they will not be permitted access.<\/p>\n<p>Hopefully that has helped somewhat and I look forward to posting similar articles in the near future!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Juniper MAG series presents very powerful and flexible configurations for remote access users. One of these configurations is the Host Checker which is what I will be briefly discussing today. The Host Checker is a component which, according to the Juniper documentation, &#8220;is a client-side agent that performs endpoint checks on hosts that connect [&hellip;]<\/p>\n","protected":false},"author":32,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"categories":[1],"tags":[124,123,125,51,126],"class_list":["post-994","post","type-post","status-publish","format-standard","hentry","category-tech","tag-host-checker","tag-juniper","tag-mag-series","tag-security","tag-vpn"],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p1trTO-g2","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/emtunc.org\/blog\/wp-json\/wp\/v2\/posts\/994","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/emtunc.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/emtunc.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/emtunc.org\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/emtunc.org\/blog\/wp-json\/wp\/v2\/comments?post=994"}],"version-history":[{"count":5,"href":"https:\/\/emtunc.org\/blog\/wp-json\/wp\/v2\/posts\/994\/revisions"}],"predecessor-version":[{"id":999,"href":"https:\/\/emtunc.org\/blog\/wp-json\/wp\/v2\/posts\/994\/revisions\/999"}],"wp:attachment":[{"href":"https:\/\/emtunc.org\/blog\/wp-json\/wp\/v2\/media?parent=994"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/emtunc.org\/blog\/wp-json\/wp\/v2\/categories?post=994"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/emtunc.org\/blog\/wp-json\/wp\/v2\/tags?post=994"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}