Overview
Custom rules allow admin to define checks to collect system health using Integrity message collector (IMC) and evaluate using Integrity message verifier (IMV) of TNC framework. The custom rules are created by the admin to include inspection checks such as absence or presence of specific file, certificate checks, TCP ports, processes, registry key settings, NetBIOS name, MAC addresses or certificate of the client machine and third-party inspection methods (custom DLLs).
You can invoke Host Checker at the role level, or the realm level to specify access requirements for endpoints attempting to authenticate.
All Host Checker rules are implemented through IMCs and IMVs based on the TNC open architecture. IMCs are software modules that Host Checker runs on the client machine. You can also configure Host Checker to monitor third-party IMCs installed on client computers by using third-party IMVs that are installed on a remote IMV server.
•IMCs are responsible for collecting information, such as antivirus, antispyware, patch management, firewall, and other configuration and security information for a client machine.
•IMVs are software modules running on the device that are responsible for verifying a particular aspect of an endpoint's integrity.
•The system and Host Checker manage the flow of information between the corresponding pairs of IMVs and IMCs. Each IMV on the device works with the corresponding IMC on the client machine to verify that the client meets the Host Checker rules.
Trusted Network Connect
Host Checker is compliant with the Trusted Network Connect (TNC) model developed by Trusted Computing Group (TCG). TCG created an architecture and set of standards for verifying endpoint integrity and policy compliance during or after a network access request. For more information about TNC, see www.trustedcomputinggroup.or
Policies
Ivanti Policy Secure(Ivanti Policy Secure) Host checker component supports many different type of product policy evaluation on endpoint along with continues monitoring of system health. The below table lists the description of various policies and features, which can be defined as part of device compliance check.
Supported Policies
Policy |
Description |
Predefined |
|
Antivirus Policy |
Policy to detect whether the Antivirus is installed and up-to-date with latest virus signatures. It also includes other options to check the last scan time, virus signature download, and remediation options. |
Firewall Policy |
Policy to detect the firewall installed on endpoint and the remediation option to turn on the firewall if it’s turned off. |
Anti-Spyware Policy |
Policy to detect the installed spyware on endpoints. |
Hard disk Encryption |
Policy to detect and check the encryption status of the specified or all drives using installed encryption software. |
Patch Management |
Policy to check whether the required operating system patches are installed properly. |
OS Checks |
Policy to check the version of the windows operating systems and minimum service packs. |
Common Vulnerability and Exposure (CVE) |
Policy to check any vulnerable attacks such as ransomware attack. |
System Integrity Protection (SIP) |
Policy to check the status (enabled/disabled) of System Integrity Protection (SIP) on the Mac OS endpoints. |
Custom |
|
3rd Party NHC Check |
Policy to specify the location of custom DLL files. |
Ports policy |
Policy to check if a particular port is either opened or closed to allow or reject the user authentication. |
Process policy |
Policy to control the software or processes that runs on the client machine. |
File policy |
Policy to check if a particular file with specific version or checksum, or last modified file is present on endpoint to allow or reject the user authentication. |
Registry Settings policy |
Policy to check the registry and its value to allow or reject the user authentication, with a remediation option to set the registry value if not configured. |
NetBIOS policy |
Policy to check the NetBIOS name from list of NetBIOS names provided to control user access. |
MAC Address policy |
Policy to check if the endpoint MAC address is in the provided regex or white listing of mac addresses to control user access. |
Machine Certificate policy |
Policy to check for the required machine certificate on the endpoint to control user access. This policy evaluates both public and private keys of the installed machine certificate on endpoint for users using Ivanti Secure Access Client. For agentless users, only public key is evaluated. |
Advanced Host Checking |
Policy to dynamically check the compliance status of the endpoints. It includes combining 2 policy types for obtaining the expected values of the check type. The expected values are fetched from registry location on the client machine for evaluating the policies. The advanced support for checking the expected values against another policy is supported on Ports, Process, File, Registry, NETBIOS, MAC Address, and Machine certificate. |
Statement of Health |
Policy to perform the health state validation to determine which roles or realms can be accessed by endpoints. It checks the system health indicators such as antivirus is enabled and up to date, antispyware is enabled and up to date, firewall is enabled and so on. |
Command |
Policy to check the versions of the installed applications on the Mac OS endpoints. |
Host Checker General Settings |
Ivanti Policy Secure provides following admin configuration options while performing host checking. |
General Options |
|
Continuous Policy Evaluation |
Option to configure periodic and continuous policy evaluation so that the endpoint is compliant with the Host Checker policy. |
Virus Signature Version Monitoring |
Option to monitor and verify the virus signatures, operating systems, and patches installed are up to date. |
Pre-Authentication Host Checking |
Pre-Authentication host checking are policies that are enforced at the realm level before authentication. |
Post-Authentication Host Checking |
Post-Authentication host checking are policies that are enforced when role assignment happens after authentication. |
Supported Platform Matrix
A Host Checker policy contains one or more rules. Each rule can apply to different host checks and for different device types (Windows, Mac, Linux, Solaris, iOS, Android). The below table lists the Host Checker policies that are supported on Windows, Mac, Linux, and Solaris.
Supported Policies for Agent/Agentless Login
Policy |
Windows |
Macintosh |
Linux |
Solaris |
Mobile |
||||||
|
Client |
Clientless |
Client |
Clientless |
Client |
Clientless |
Client |
Clientless |
Windows Phone & ChromeOS |
iOS |
Android |
Antivirus |
Yes |
Yes* |
Yes |
Yes* |
No |
No |
No |
No |
No |
No |
No |
Firewall |
Yes |
Yes* |
Yes |
Yes* |
No |
No |
No |
No |
No |
No |
No |
AntiSpyware |
Yes |
Yes |
Yes |
Yes |
No |
No |
No |
No |
No |
No |
No |
Hard Disk Encryption |
Yes |
Yes |
Yes |
Yes |
No |
No |
No |
No |
No |
No |
No |
Patch Assessment |
Yes |
Yes |
Yes |
Yes |
No |
No |
No |
No |
No |
No |
No |
OS Checks |
Yes |
Yes |
Yes |
Yes |
No |
No |
No |
No |
Yes |
Yes |
Yes |
Rooting Detection |
No |
No |
No |
No |
No |
No |
No |
No |
No |
No |
Yes |
Jail Breaking Detection |
No |
No |
No |
No |
No |
No |
No |
No |
No |
Yes |
No |
Common Vulnerability and Exposure (CVE) Check |
Yes |
Yes |
No |
No |
No |
No |
No |
No |
No |
No |
No |
3rd Party NHC Checks |
Yes |
Yes |
No |
No |
No |
No |
No |
No |
No |
No |
No |
Ports |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
No |
No |
No |
Process |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
No |
No |
No |
Files |
Yes |
Yes** |
Yes |
Yes** |
Yes |
Yes** |
Yes |
Yes** |
No |
No |
No |
Registry Setting |
Yes |
Yes*** |
No |
No |
No |
No |
No |
No |
No |
No |
No |
NetBIOS |
Yes |
Yes |
Yes |
Yes |
No |
No |
No |
No |
No |
No |
No |
MAC Address |
Yes |
Yes |
Yes |
Yes |
No |
No |
No |
No |
No |
No |
No |
Machine Certificates |
Yes |
Yes**** |
Yes |
Yes |
No |
No |
No |
No |
No |
No |
No |
Statement of Health |
Yes |
Yes |
No |
No |
No |
No |
No |
No |
No |
No |
No |
System Integrity Protection (SIP) |
No |
No |
Yes |
Yes |
No |
No |
No |
No |
No |
No |
No |
Command |
No |
No |
Yes |
Yes |
No |
No |
No |
No |
No |
No |
No |
Advanced Host Checking |
Yes |
Yes |
No |
No |
No |
No |
No |
No |
No |
No |
No |
- * In some occasions, Antivirus/Firewall products restricts the remediation actions to admin/services (For example but not limited to, turning on firewall). In such scenarios, certain remediation actions won’t work with browser/clientless logins. Note that, this is defined by the corresponding security products.
- **Admin should enable system level access for accessing certain files and file locations for browser login.
- ***To access device-certificates from system store, the plugin needs admin rights. With browser/clientless login private key verification is not supported in Agentless login.
- ****Registry verification requires admin privileges for accessing certain registry files. There are limitations with accessing some of the registry hierarchy for evaluating registry checks for browser login.
- Agentless mode with Profiler is supported only with Windows platforms. The supported policies are Antivirus, Firewall, Antispyware, OS checks, Ports, Process, NetBIOS, and MAC Address. For more information, see the Ivanti Policy Secure Profiler Administration Guide.
Host Checker Remediation Capabilities
|
Windows |
Mac OS |
Linux |
Custom Instructions |
Yes |
Yes |
Yes |
Custom Actions |
Yes |
- |
- |
Kill Process |
Yes |
Yes |
Yes |
Delete Files |
Yes |
Yes |
Yes |
Reason String |
Yes |
Yes |
Yes |