GlobalProtect does have a way to silently update once updated and published on the firewall, but i recommend using whatever your software deployment process is. So many times the silent update never happens on an endpoint or even worse, the globalprotect client breaks.
From what I know, the users don’t need admin rights to update. You can either force the update when the VPN connects next time or give users a choice whether or not to update. If you go to the ‘App’ settings and find ‘Allow User to Upgrade GlobalProtect App’ there are various options and one of them is update tansparently.
But if you have a different team that manages the devices, make this their problem and let them handle the update via whatever MDM they use.
I personally use the transparent update on all my deployments and have never had any issues. However if you tunnel everything just make sure the client can reach the portal or resolve the dns name if applicable of the portal. Other than that I prefer this over other options…
We do both. When we update we do it via intune and sccm. After a few weeks we update the profile to push transparently for any clients that didn’t get it via MDM.
I look at it as beta testing for end users. The last bug-fixing release, App 6.3.1-c383, can’t be upgraded when you have the 6.3.1 version already installed. TAC proposed uninstalling everything for 1,000 users and installing it from scratch.
Some of childhood issues were finally fixed , but I’m not sure around it - GPC-20492 - PanGPS process crash .
Some of our endusers are involved in Zscaller private / internet access usage - no one issue were reported with clients it self .
Does PA has plans to finally shutdown Global protect era and move everyone to Prisma client that was developed from scratch with endpoint notifications and other valuable features ?
I second updating using SW deployment process. We update it with InTune or SCCM, easy enough to deploy, upgrade and possible to rollback should you need to. I don’t believe rolling back is supported using gp own deployment method.
That has worked well for me too. I don’t like that the pop-up announcing the update disappears in 0.2 seconds. Users don’t see it and get worried when GP restarts. I have had two, maybe three users over a couple of years who, thinking something was wrong, immediately rebooted their computer when GP restarted and it broke the update. I had to walk them through uninstall/reinstall. But it is a minor complaint.
InTune or SCCM should be used to update it the built in Palo way is pretty trashy And I’ve experienced issues with it upgrading sometimes just straight up failing. Then you get devices that no longer have it installed or are in a broken State not to mention there really is no automatic update. You still have to go manually grab the new client and make it active even on the gateway for its upgrade to happen. It doesn’t just do it.
I’ve always had success with Intune. InTune is easy package new MSI as win32 app upload it and set it to supersede you existing install make sure you check the auto upgrade check box under the assignment option so it will also update install that were available and not required.
That seems really strange to me because why would it need to connect to an External gateway when connected and now being seen inside?
When you’re outside: portal.company.com resolves to a public address how and why would you have that internal as well? Plus you’re already connected to that.
exactly my problem, host file modifications will allow this but not scalable at all. A-record in top zone causes errors on the dc. Wish there was a service route specifically for GP client updates we can point to the mgmt interface on the FW itself.