HIP Objects

HIP objects allow you to configure compliance criteria for endpoint devices and can be used as conditions in security policies.

Note To specify certain conditions, a licensed Security Updates module is required that enables downloading library updates.

To add an object, provide these settings:

Name

Description

Name

The name of the HIP object.

Description

(Optional) description of the HIP object.

OS version

The version of the operating system on the user device.

When using the = and != operators, specify the full version of Windows.

UserGate client version

The version of the UserGate client software.

Connection security

Endpoint security component statuses:

  • Firewall;

  • Antimalware;

  • Automatic Update;

  • Bitlocker.

Important! BitLocker is considered enabled if it is enabled on at least one of the disks.

Products

Conformance check of the software installed on the endpoint:

  • Антивирус. Conformance check of the antimalware software on the user device:

    • Enabled: check the software status

    • Antimalware database updated: checking database relevance (yes, no, or do not check)

    • Version: the version of the software

    • Вендор: производитель и название продукта.

  • Межсетевой экран. Conformance check of the firewall on the device. You need to specify the following parameters:

    • Installed: check if the software is installed

    • Enabled: check the software status (yes, no, or do not check)

    • Version: the version of the software

    • Vendor: the device vendor and product name

  • Резервное копирование. Conformance check of the backup software:

    • Installed: check if the software is installed

    • Version: the version of the software

    • Вендор: производитель и название продукта.

  • Шифрование диска. Conformance check of disk encryption programs installed on the endpoint:

    • Installed: check if the software is installed

    • Version: the version of the software

    • Вендор: производитель и название продукта.

  • DLP. Conformance check of the data leak protection system on the device:

    • Installed: check if the software is installed

    • Version: the version of the software

    • Вендор: производитель и название продукта.

  • Update management. Check for current updates.

    • Installed: check if the software is installed

    • Version: the version of the software

    • Вендор: производитель и название продукта.

Processes

Check the processes running on the device.

Running services

Check the services running on the device.

Registry keys

Ключ реестра Microsoft Windows - каталог, в котором хранятся настройки и параметры операционной системы.

The following types of registry values are supported:

  • REG_SZ: строка Unicode или ANSI с нулевым символом в конце.

  • REG_BINARY: двоичные данные в любой форме.

  • REG_DWORD: 32-разрядное число.

The following registry keys can be checked:

  • HKEY_LOCAL_MACHINE

  • HKEY_USERS

Important! The path specification begins with a backslash (\), such as \HKEY_LOCAL_MACHINE, followed by the full registry path with backslash (\) used as the separator.

Описание ключей реестра читайте в документации Microsoft (https://docs.microsoft.com/ru-ru/troubleshoot/developer/webapps/iis/general/use-registry-keys).

Installed updates

Check that a specific update is installed on the device. The Microsoft Knowledge Base (KB) article number must be specified, e.g., KB5013624.