Secure Profiler Admin Guide
Secure Profiler Admin Guide
Administration Guide
Pulse Secure and the Pulse Secure logo are trademarks of Pulse Secure, LLC in the United States. All other trademarks, service
marks, registered trademarks, or registered service marks are the property of their respective owners.
Pulse Secure, LLC assumes no responsibility for any inaccuracies in this document. Pulse Secure, LLC reserves the right to change,
modify, transfer, or otherwise revise this publication without notice.
The information in this document is current as of the date on the title page.
The Pulse Secure product that is the subject of this technical documentation consists of (or is intended for use with) Pulse Secure
software. Use of such software is subject to the terms and conditions of the End User License Agreement (“EULA”) posted at
www.pulsesecure.net. By downloading, installing or using such software, you agree to the terms and conditions of that EULA.”
Palo Alto Networks, the Palo Alto Networks Logo, Palo Alto Networks Firewall, PAN-OS, User-ID, App-ID, and Panorama are
trademarks of Palo Alto Networks, Inc. For additional information on Palo Alto Networks products, visit
www.paloaltonetworks.com
Contents
ABOUT THIS DOCUMENT ............................................................................................................................... 5
DOCUMENT CONVENTIONS ........................................................................................................................................................5
Notes, cautions, and warnings ......................................................................................................................................5
Text formatting conventions..........................................................................................................................................5
Command syntax conventions......................................................................................................................................5
SELF-HELP ONLINE TOOLS AND RESOURCES .............................................................................................................................6
REQUESTING TECHNICAL SUPPORT ............................................................................................................................................6
OPENING A CASE WITH PSGSC .................................................................................................................................................6
INTRODUCTION ............................................................................................................................................. 7
DEPLOYMENT AND LICENSE REQUIREMENTS .............................................................................................. 8
DISCOVERING ENDPOINT DEVICES ............................................................................................................... 9
PASSIVE COLLECTORS ................................................................................................................................................................9
DHCP collector ..................................................................................................................................................................9
User Agent Collector........................................................................................................................................................9
Network Infrastructure Device Collector ....................................................................................................................9
SNMP Trap .........................................................................................................................................................................10
ACTIVE COLLECTORS ..................................................................................................................................................................10
Nmap Collector .................................................................................................................................................................10
WMI Collector ....................................................................................................................................................................10
SSH Collector .....................................................................................................................................................................10
MDM Collector ..................................................................................................................................................................10
CONFIGURING THE LOCAL PROFILER AUTHENTICATION SERVER .................................................................................................10
PROFILER REPORTS ........................................................................................................................................ 14
DASHBOARD ..............................................................................................................................................................................14
PROFILER REPORT SCHEDULING .................................................................................................................................................15
DEVICE DISCOVERY REPORT TABLE ............................................................................................................... 17
ENDPOINT INFORMATION ...........................................................................................................................................................17
ENDPOINT FILTERS .....................................................................................................................................................................18
REPORT OPERATIONS .................................................................................................................................................................18
DEVICE OPERATIONS ..................................................................................................................................................................18
ACCESS CONTROL .......................................................................................................................................... 20
SPOOF DETECTION .....................................................................................................................................................................20
DEVICE SPONSORING .................................................................................................................................................................20
PROFILE GROUPS .......................................................................................................................................................................20
CONFIGURING ROLE-MAPPING RULES FOR PROFILED DEVICES..................................................................................................21
AGENTLESS HOST CHECKER WITH PROFILER................................................................................................ 24
CONFIGURING AGENTLESS HOST CHECKER WITH PROFILER .......................................................................................................24
IMPORT/EXPORT PROFILER DATABASE......................................................................................................... 30
IMPORT / EXPORT PROFILER DEVICE DATA IN BINARY FORMAT ...................................................................................................30
IMPORT / EXPORT PROFILER DEVICE DATA IN CSV FORMAT: ......................................................................................................30
IMPORT/ EXPORT OF PROFILE MODIFICATIONS DATABASE IN BINARY FORMAT ............................................................................31
TROUBLESHOOTING ...................................................................................................................................... 32
TESTS .........................................................................................................................................................................................32
PROFILER LOGS ..........................................................................................................................................................................32
PROFILER DEPLOYMENT CASES..................................................................................................................... 35
STANDALONE PROFILER .............................................................................................................................................................35
REMOTE PROFILER .....................................................................................................................................................................35
PROFILING DEVICES IN BRANCH OFFICES .....................................................................................................................................36
Document conventions
The document conventions describe text formatting conventions, command syntax conventions, and important
notice formats used in technical documentation.
An Attention statement indicates a stronger note, for example, to alert you when traffic
might be interrupted, or the device might reboot.
A Caution statement alerts you to situations that can be potentially hazardous to you or
cause damage to hardware, firmware, software, or data.
Format Description
Convention Description
Value A fixed value provided as input to a command option is printed in plain text, for
example, --show WWN.
<> Nonprinting characters, for example, passwords, are enclosed in angle brackets.
\ Indicates a “soft” line break in command examples. If a backslash separates two lines of
a command input, enter the entire command at the prompt without the backslash.
Introduction
Pulse Policy Secure (PPS), an industry recognized network access control (NAC) solution, authenticates users,
ensures that endpoints meet security policies, and then dynamically provisions access through an enforcement
point (such as a firewall or switch) based on the resulting user session information - including user identity, device
type, IP address, and role.
The Pulse Secure Profiler dynamically identifies and classifies both managed and unmanaged endpoint devices,
enabling control of access to networks and resources based on the type of the device.
Pulse Policy Secure integrates with the Profiler to provide visibility and control of endpoint devices. This document
focuses on features of the Profiler in a network with an existing Policy Secure deployment already configured with
the basic elements required to provide network access, including authentication servers, sign-in policies, roles,
realms, and SNMP-based enforcement or RADIUS attributes policies for enforcement based on 802.1X / MAC
authentication. Please refer to the PPS Administration Guide for details.
Passive Collectors
Passive collectors are initiated based on network events or timer events. For example, a new DHCP packet is
received from the network which triggers the DHCP collector to profile the device.
DHCP collector
The profiler uses DHCP fingerprinting for endpoint classification of the end points such as laptops and desktops
that are configured to have a DHCP IP address. One or more switched or WLAN controllers must be configured to
forward all DHCP packets for each VLAN to the internal interface of the PPS appliance. This enables the on-box
Profiler to profile endpoints by parsing the DHCP packets arriving at the PPS appliance.
In some environments, it is easier to forward DHCP traffic to the Profiler using the SPAN/RSPAN configuration.
Note: The ARP/MAC tables are fetched from the Network Infrastructure Device periodically. The poll
interval can be configured by the administrator.
CDP and LLDP collection methods is also supported by any other devices that send CDP or LLDP announcements.
CDP and LLDP data provides more accurate version of OS, model, and category information. The discovery
protocols are enabled by default in most of the network infrastructure devices.
Note: In this release, this feature is supported for Palo Alto Network vendors only.
SNMP Trap
Profiler supports SNMP Trap based discovery which helps to accurately detect when the endpoint is connected to
or disconnected from the switch using link down, link up and mac change notification SNMP traps. This specifically
helps in detecting the endpoints that are connected to the switches for brief period of times that are in between
Profiler Poll interval for Network Infrastructure Devices.
Active Collectors
Active collectors are initiated by Profiler. Once devices are discovered using DHCP, SNMP or other mechanisms,
more granular profiling is done only for those devices using various active collectors.
Nmap Collector
Nmap scan runs on all endpoints that have an IP address that are in white listed subnets, as and when they have
discovered by other collectors.
WMI Collector
The Profiler runs WMI scan to collect more accurate and detailed information of Windows endpoints.
SSH Collector
SSH is another active collection method that can be used to gather detailed information which would help to
profile endpoints accurately.
Note: In this release, this mechanism is supported for MAC OSX endpoints only.
MDM Collector
Pulse Policy Secure can communicate with Mobile Device Management Platforms such as AirWatch and MobileIron
to retrieve more information about managed mobile endpoints.
As both an MDM server and the Profiler acts as a device attribute server, it is important to provide the
administrator an aggregated view of the attributes. The attributes that are retrieved from the MDM are merged
with the device attributes computed by the Profiler to offer better classification and manageability of those
endpoints.
5. (Optional) The SNMP/SSH scan for Network Infrastructure Devices would trigger and look for connected
endpoints after a predefined Poll interval.
Set SNMP Poll interval, if any Network Infrastructure Devices are configured. By default, the poll interval is
set as 60 minutes.
6. (Optional) Select device categories which trigger e-mail(s) to the administrator for approval. Also create a
role-mapping rule based on status attribute to assign the device to the respective role before and after
approval. For more information see, Device Sponsoring.
Select Use emails from General Settings to send e-mails to address specified in General Settings or select
Custom and enter the e-mail addresses separated by semicolon.
Enter the Profiler hostname or IP address to fill the URL. This link in the e-mail notification allows to quickly
to access the Device Discovery Report and take appropriate action for devices that require approval.
7. (Optional) Upon device discovery, using DHCP, SNMP or other mechanisms, granular profiling is
performed on devices using various active collectors. Add one or more subnets which are included or
excluded for collectors like SSH, WMI and NMAP. Maximum 100 subnets configuration are supported.
On-Demand Scan can be triggered anytime on the subnets for selected collectors.
Figure 6: Adding One or More Subnets
8. (Optional) In the WMI profiling section, select Configure WMI credentials and specify the domain
administrator or user with administrator credentials to fetch accurate endpoint information from remote
desktops running Microsoft Windows. Select Use Active Directory server credentials to use existing Active
Directory server credentials.
Note: If multiple antivirus software is installed on the remote desktops, WMI fetches information
about only one of the antivirus. WMI does not fetch information about Windows Defender.
9. (Optional) In the SSH Profiling section, select the Authentication Method and enter credentials as
applicable. Enter the Endpoint IP or hostname to test the credentials.
10. (Optional) Specify the existing MDM authentication server for accurate profiling of mobile devices which
are registered through MDM providers.
Devices that are discovered are profiled and updated in the Device Discovery Table and an overall summary is
shown in the Device Profiles Dashboard.
The devices can be grouped based on group name and rules using device attributes. For more information see,
Profile Groups.
Profiler Reports
Dashboard
Once the Profiler is configured, profiling starts in the background. Devices that are discovered are profiled and
updated in the Device Discovery Table and an overall summary is shown in the Device Profiles Dashboard.
Click on each chart or numbered panel to view detailed information in the device discovery report.
The upper part of the dashboard displays the number panels representing the number of devices for each of the
following status:
• Devices waiting to be Profiled
• Devices for which the profile has changed
• Unmanaged devices
• Devices waiting for administrator approval
• Devices added in last 24 hours
• Devices added last week
• Devices added last month
The charts in the dashboard can be customized by the administrator by setting the following parameters:
• Timeframe: The charts display information for the specified timeframe. By default, the information for the
last 24 hours is displayed. The timeframe can also be set to 7 days, 30 days, or All.
• Refresh: The refresh time interval to update the charts. By default, the charts refresh every 5 mins. The
time interval can also be set to disabled, 10 minutes, 30 minutes, or 60 minutes.
• Select list of charts: List of charts to select to display in the dashboard.
• Charts Per Row: Number of charts to display in a row on the dashboard. By default, 3 charts are
displayed in a row. 1 or 2 charts can be displayed in each row.
• Profiler: The profiler for which the information is displayed. By default, information for all profilers are
displayed.
The following charts are displayed in the dashboard:
• Device Profile State: Represents the device classification based on Profile status such as Profiled devices,
Unprofiled devices, Profile changed devices.
• Manufacturer Types: Represents the device classification based on the device manufacturer. For
example, VMware. Inc, Apple. Inc
• Device Categories: Represents the device classification based on the device category such as
smartphones, laptops, windows.
• Device Types: Represents the device classification based on device types. For example, Windows, Apple
iPod, iPhone.
• Managed vs Unmanaged: Represent the device classification on the managed and unmanaged device
status. Managed devices are detected by the MDM or a Pulse Client session is established on the
device.
• Active Sessions: Represent the devices based on the device sessions such as Remote sessions and On-
Premise session.
The charts can be viewed on the dashboard or can be downloaded as a report in PDF format. The reports can be
scheduled to be emailed as well.
Select System > Reports > Device Discovery to display the table.
Endpoint Information
All current and historical information for a device is displayed in an expanded view based on IP address, sessions
(remote, local) or profiles changes.
Expand the required endpoint to display current Details and History.
Endpoint Filters
A list of filters is available for quick analysis of discovered devices. The filers are displayed to the left of the table.
• Filters based on time – Last 24 hours, Last week, Last month
• Filters based on sessions – Active sessions, Remote sessions, On-premise sessions
• Filters based on actions of the discovered devices – Managed devices, Unmanaged devices, Profiled
devices, Approved and unapproved devices, Unprofiled devices, Profile changed devices. Manually
edited devices, Devices with Notes
Note: If an endpoint is classified incorrectly, please see the Troubleshooting section to rectify the
problem.
Report Operations
The Device Discovery Report Table allows the following operations on all the discovered devices.
• Records per page: Allows to customize the number of records displayed in the page.
• Head row: Lists the main attributes for the devices such as IP Address, MAC Address etc. Click the
column head to sort the table with respect to the column. Double click to sort in reverse order.
• Search: Allows to search devices based on the Address or other device attributes.
• Actions: Allows the following functions:
o Approve/Unapprove selected devices: Allows to manually approve or unapproved the selected
devices.
o Add Device: Allows to add new devices. Enter important attributes like MAC Address,
Manufacturer, Operating system, and category.
o Download Report: Allows to download and save the report in CSV format.
o Delete Selected: Allows to delete the selected devices.
Device Operations
The Device Discovery Report Table allows the following operations for each of the listed devices.
• Approve/Unapprove: Each endpoint has an attribute called status and allows to manually approve or
unappove a specific device. See Device Sponsoring for more information.
• Edit: Allows to edit Manufacturer, Category and Operating System fields. Manually Added or Edited
device attributes are auto updated when the classifier updates its attributes. If you want to avoid
updates from classifier, select Override any updates by the profiler and use this profile always for the
device.
• Edit all similar devices: Allows to edit all similar devices which have same fingerprint. When similar devices
are added, the updated fingerprint is used for profiling.
• Submit a ticket: The Profiler uses Fingerbank database to classify devices.
It is possible that some devices are not correctly classified in this process. In such cases, the
administrator can use the Copy Fingerprint option to copy the fringerprint and send the relevant
information about the wrongly classified device to the Pulse Secure using an E-mail. This information is
verified before updating the Custom Fingerprint database.
• Delete: Allows to delete a device. If the deleted devices are rediscovered by the Profiler, they are again
included in the list.
Access Control
After creating the Local Profiler Authorization Server, you can use device attributes from the Profiler in the role
mapping rules for both MAC Authorization and 802.1X realms for policy enforcement.
Spoof Detection
The profiler allows a mechanism to suspect MAC address spoofing, , provided MAC spoofing results in a profile
change of the device. Profile change would be indicated by the previous_os and previous_category fields.
For example, MAC address spoofing can be detected if an endpoint was a printer in the stored profile and the
latest profile indicates the same device as a Linux endpoint.
To detect spoof for a specific device, use the following Regexp in role mapping rule:
deviceAttr.previous_os != '' AND (deviceAttr.previous_os = 'Cisco VoIP' AND
deviceAttr.os != 'Cisco VoIP')
Use the following Regexp, which is common for all Operating Systems:
deviceAttr.previous_os != '' AND (deviceAttr.previous_os != deviceAttr.os)
Note: This feature works only when the actual device is profiled with information of OS and categories before
spoofed device connects and is profiled. Mac spoof suspect might not work when same OS or Category
information is identified for original and spoofed device.
Device Sponsoring
This feature allows an administrator to manually approve devices that belong to a specific category on a
production network. The administrator can configure categories that need approval and the profiler to identify the
devices that belong to these categories. The profiler notifies the administrator when new devices are detected. The
administrator can approve so that the role of the newly detected device changes according to the role mapping
rules.
Profile Groups
The devices can be grouped based on group name and rules for easy access and identification. Group names can
be used in role mapping rules, resource policies, filtering etc.
1. Select the Profiler server under Authentication Auth. Servers.
2. Select Profile Groups tab, select the New Profile Group and enter the Group Name and Rule.: The rules can
be written with device attributes and suggested operators can be chosen from the list. As an optional step,
emails also can be configured which results in notifications for any group related changes.
To create rules for all values including null, use the format: rule: category ="*" or category ="".
3. Click Save.
Note: Updating the profile groups for existing devices may take time if a rule covers more devices. Navigating
away from the page cancels the update for the existing devices. But, the group names are updated when the
device receive updates during regular profiling.
Note: If a rule exists, then the Rule based on drop-down will not appear.
7. Enter a name for the rule (if creating a new one).
8. Create the new role mapping rule based on the new device attributes that are now available in
the attributes drop-down field. When setting the attribute value, make sure the value you enter
is an exact match for the value displayed in the Device Discovery Report table. Wildcards (* and
?) can be used in the attribute value.
Note: Role mapping rules in the MAC authorization realm apply to both MAC-RADIUS enforcements
in an 802.1X environment and SNMP-based enforcement.
The Profiler can also work as a device attribute server for authentication. Wildcards (* and ?) can be used in the
attribute value.
The following table lists the device attributes based on which you can create rules and assign to the user roles.
antivirus_name The name of the antivirus running on the device MacAfee, Symantec Endpoint
Protection, etc.
antivirus_status The status of the antivirus running on the device Enabled or Disabled
Custom The administrator defined value(s) for the device. Administaror defined values
groups The list of groups and rules associated to the device Administaror defined values
last_seen The timestamp when the device was last updated 2018-04-06
05:38:43.877617+00:00
Os The Operating system running on the device or the Windows 7.x, AC OS X, Ruckus,
type of the device. Wireless AP, etc
profiler_name The name of the profiler used to profile the device Local Profiler
tcp_open_ports The open TCP ports on the device List of port values
udp_open_ports The open UDP ports on the device List of port values
Note: Host checker Polices configured for Agentless Mode are listed and indicated as (Agentless
Mode with Profiler), in the policies table under Authentication > Endpoint Security > Host Checker.
4. Click on the policy name to associate the rules to the policy. select the rule type under Rule Settings and
click Add.
a. If you select Predefined: Antivirus, the rule requires endpoint to have specific antivirus installed
and running.
Enter the Rule Name, select required Criteria, Optional rules and click Save Changes.
b. If you select Predefined: Firewall, the rule requires the endpoint to have a specific firewall
installed and running.
Enter the Rule Name, select required Criteria and click Save Changes.
Figure 21: Firewall Rule Type for Agentless mode
c. If you select Predefined: AntiSpyware, the rule checks for installed AntiSpyware on endpoints.
Enter the Rule Name, select required Criteria and click Save Changes.
d. If you select Predefined: OS Checks, the rule checks the operating systems and minimum
service pack versions listed.
Enter the Rule Name, select required Criteria and click Save Changes.
Figure 23: OS Checks Rule Type for Agentless mode
e. If you select Custom Rule: Ports, the rule controls the network connections that a client can
generate during a session. This rule type checks. if restricted ports are open or required ports
are not open, then endpoint gets limited connectivity to the network.
Enter the Rule Name, enter port numbers to allow or deny under Criteria and click Save
Changes.
Figure 24: Ports Rule Type for Agentless mode
f. If you select Custom Rule: Process, the rule controls the software that a client may run during a
session.
Enter the Rule Name, enter Process Name to allow or deny under Criteria and click Save
Changes.
g. If you select Custom Rule: NetBIOS, the rule checks the NetBIOS name of the client machine.
Enter the Rule Name, enter NetBIOS Names to allow or deny under Criteria and click Save
Changes.
h. If you select Custom Rule: MAC Address, the rule checks the MAC Address of the client
machine.
Enter the Rule Name, enter MAC Addresses to allow or deny under Criteria and click Save
Changes.
Figure 27: MAC Address Rule Type for Agentless mode
5. On adding the Rule Types, select the required option for rules, and Dashboard Reporting options and click
Save Changes.
6. Enforce the policies for Agentless Mode with Profiler and implement the policy at the realm level.
Navigate to Users > User Realms > Select Realm > Authentication Policy > Host Checker. Select Agentless
mode with Profiler. Select the applicable policies from the list and click Save Changes.
Note: Pre-authentication compliance check is not supported for agentless mode with Profiler. The
Require and Enforce option is disabled for agentless policies.
Figure 28: Policy enforcement for Agentless mode with Profiler on User Realm
7. Allow access to devices that comply with Agentless Host Checker policies.
Navigate to Users > User Roles > Select Role > General > Restrictions > Host Checker add or remove the
policies from the list and click Save Changes.
Figure 29: Policy enforcement for Agentless mode with Profiler on User Role
Binary Export
On export, profiler device data is encrypted and downloaded with filename Profiler*.cfg.
Binary Import
The device database import in Binary format erases the existing database completely. The endpoint session
information is invalidated.
CSV Export
On export, the complete device data information is exported into a CSV file. This is the same behavior as the
Download Report in the Profiler DDR.
CSV Import
• The CSV import to the profiler device database, appends the existing database. It does not erase the
existing database completely.
• The CSV format allows to import only essential endpoint information such as Macaddr, IP, hostname,
manufacturer, os, category, previous_os, previous_category, notes, first_seen, last_seen, profiler_name,
groups and custom.
• For existing devices, the data is overwritten for the supported fields from CSV. Remaining data remains
as is.
• For devices that are marked as Manually Edited Devices, no further classification is performed on the
imported endpoints
• To avoid the Operating and Category changes to the devices received by the classifier on importing the
CSV file, include or edit the column override and set the value to TRUE for each device in the CSV file.
• Custom field can be provided in the CSV for import. This column is visible in the DDR only if customer has
imported custom data. Custom field is available for role mapping rules.
Troubleshooting
Tests
The following tests helps to identify and solve basic problems associated with configurations of the Profiler.
Test Result
DHCP Test • Verify if ports are receiving the DHCP packets.
• Detect a device when connected to network during the diagnostic
run.
Switch Diagnostics • Verify switches are enabled
• Check if SNMP walk is successful or not
• Check if Profiler can successfully read ARP table, CAM table, and SSID
information
NMAP Scan Test • Check if NMAP scan is working for an IP address, which is prompted
during diagnostic run
Trap Test • Verify if trap is collected or not for a switch event.
• Detect a device when connected to network during the diagnostic
run.
SMTP Test • Troubleshoot any problem in configuration/reachability of SMTP
server.
Device sponsoring is available with email notification feature. It sends
an email through configured SMTP server and displays the status.
Profiler Logs
The Profiler logs all its activities to the Event Log and Administrator Access Logs.
To see the Profiler logs in the Event log, select Log/Monitoring > Events > Log Settings and enable the “Profiler
Events” checkbox.
Standalone Profiler
Standalone Profiler can be deployed as an independent appliance. All PPS and PCS appliances communicate with
this Standalone Profiler for authorization.
A Standalone Profiler is useful in the following cases:
• You want to profile devices that are outside the enterprise network and connected via PCS.
• You have an active/active cluster (or multiple un-clustered set) of PPS appliances.
Figure 32: Example of a Standalone Profiler deployed in a typical PPS Active/Active cluster
Remote Profiler
A Remote Profiler can be configured on a PCS/PPS appliance to profile devices that are connected to them. To
configure the remote profiler, the IP address of the standalone Profiler is configured on the PCS/PPS. The remote
profiler is configured as device attribute server and used in role mapping rules.
A Remote Profiler is useful to view all endpoints inside and outside the network.
The Profiler Forwarder is a physical or virtual appliance with distinctive feature license called Profiler Forwarder
license. The Profiler Forwarder enables the Profiler to run locally, profile the endpoints, and send the profiled
information to the central Standalone Profiler periodically (default: 5 minutes). The profiler forwarder can be
configured to include the branch name in the Device Discovery Report.