Skip to content

KB006: Configure Security Agent Policies (Beta Feature)

Article ID: KB006

Last Updated: June 21, 2025

Applies To: HySecure Gateway 7.1 and above

Category: Endpoint Security & Compliance

Feature Status: Beta

Overview

This guide explains how to configure Security and Encryption Agent support in Endpoint Security policies. This feature validates that required security and encryption agents are installed on user devices during login, ensuring only compliant endpoints can access resources.

Prerequisites

  • HySecure Gateway 7.1 or higher
  • Security Officer or Administrator access to the HySecure Management Console

Benefits

  • Endpoint Compliance: Ensure only devices with required security tools can connect.
  • Risk Reduction: Prevent non-compliant or unsecured endpoints from accessing resources.
  • Real-Time Validation: Verify agent status and real-time protection during login.

Supported Agents

Security Agents

Agent Description Real-Time Protection
Forcepoint Forcepoint security agent Supported
Zscaler Zscaler security agent Supported

Encryption Agents

Agent Description Real-Time Protection
BitLocker Microsoft BitLocker Supported
McAfee McAfee Encryption agent Supported

Procedure Part 1: Configure Security Agent-Based Policy

Step 1: Create Security Agent Host Scan Policy

  1. Access Management Console

    • Log in to the HySecure Management Console as a Security Officer or Administrator.
  2. Navigate to Host Scan Policies

    • Go to Policies > Endpoint Security Policies > Host Scan Policies.

    • Click Add.

  3. Configure Basic Policy Settings

    • Enter the appropriate Policy Name.

    • Provide Description.

    • Select Policy Type as Security Agent.

Step 2: Create Security Agent Sub-Policy

  1. Add Security Agent Policy

    • Click Add Security Agent Policy to create a sub-policy.
  2. Configure Security Agent Details

    • Enter Policy Name for the sub-policy.

    • Select an Agent based on requirements:

      Agent Options:

      • Forcepoint: Allow access only from devices with the Forcepoint security agent.
      • Zscaler: Allow access only from devices with the Zscaler security agent.
  3. Configure Real-Time Protection

    • Select the checkbox Real Time Protection enabled to validate if real-time protection is enabled.

    • If enabled: Devices with an installed security agent but disabled real-time protection will fail the security scan.

    • If disabled: Only agent presence is validated, not real-time protection status.

  1. Navigate to Device Profiles

    • Go to Policies > Endpoint Security Policies > Device Profiles.

    • Create a new device profile or edit an existing one.

  2. Link Host Scan Policy

    • Select the created Security Agent Host Scan Policy.

    • Associate with the device profile for Endpoint Security validation.

Procedure Part 2: Configure Encryption Agent-Based Policy

Step 1: Create Encryption Agent Host Scan Policy

  1. Access Management Console

    • Log in to the HySecure Management Console as a Security Officer or Administrator.
  2. Navigate to Host Scan Policies

    • Go to Policies > Endpoint Security Policies > Host Scan Policies.

    • Click Add.

  3. Configure Basic Policy Settings

    • Enter the appropriate Policy Name.

    • Provide Description.

    • Select Policy Type as Encryption Agent.

Step 2: Create Encryption Agent Sub-Policy

  1. Add Encryption Agent Policy

    • Click Add Encryption Agent Policy to create a sub-policy.
  2. Configure Encryption Agent Details

    • Enter Policy Name for the sub-policy.

    • Select an Agent based on requirements:

      Agent Options:

      • Any Encryption Agent: Allow access from devices with any encryption agent installed.

      • BitLocker: Allow access only from devices with BitLocker encryption.

      • McAfee: Allow access only from devices with the McAfee Encryption agent.

  3. Configure Real-Time Protection

    • Select the checkbox Real Time Protection enabled to validate encryption agent status.

    • If enabled: Devices with an installed encryption agent but disabled real-time protection will fail the security scan.

    • If disabled: Only agent presence is validated.

  1. Navigate to Device Profiles

    • Go to Policies > Endpoint Security Policies > Device Profiles.

    • Create a new device profile or edit an existing one.

  2. Link Host Scan Policy

    • Select the created Encryption Agent Host Scan Policy.

    • Associate with the device profile for Endpoint Security validation.

Policy Configuration Examples

Example 1: Require Any Security Agent

Policy Type: Security Agent

Agent: Any Security Agent

Real-Time Protection: Enabled

Use Case: Ensure devices have some form of security protection

Example 2: Mandate Specific Encryption

Policy Type: Encryption Agent

Agent: BitLocker

Real-Time Protection: Enabled

Use Case: Corporate compliance requiring BitLocker encryption

Example 3: Flexible Security with Monitoring

Policy Type: Security Agent

Agent: Any Security Agent

Real-Time Protection: Disabled

Use Case: Monitor security agent deployment without blocking access

Monitoring and Logging

Log Information

Endpoint Security Logs Include:

  • Agent detection results
  • Real-time protection status
  • Policy enforcement decisions
  • User and device information
  • Timestamp and policy details

Accessing Logs

  1. Navigate to Reports

    • Go to Logs > Endpoint Security Logs.
  2. Filter Agent-Related Events

    • Filter by policy type (Security Agent/Encryption Agent).

    • Search by specific agent names.

    • Review compliance trends.

Important Notes

Beta Feature Considerations

Current Status:

  • This feature is in the Beta release.
  • May have limitations or occasional issues.
  • Feedback welcomed for improvement.

Production Use:

  • Test thoroughly before production deployment.
  • Monitor logs for unexpected behavior.
  • Have fallback policies if needed.

Agent Compatibility

Supported Platforms:

  • Windows-based security and encryption agents.
  • Agent-specific detection methods.
  • Version compatibility varies by agent.

Detection Limitations:

  • Some agents may not be detected properly.
  • Agent updates may affect detection.

Troubleshooting

Common Issues:

Agent Not Detected:

  • Verify the agent is properly installed and running.
  • Check agent version compatibility.
  • Review endpoint security scan logs.

Real-Time Protection Issues:

  • Agent installed, but protection shows as disabled.
  • Verify agent configuration and status.
  • Check agent-specific protection settings.

Policy Not Enforcing:

  • Check policy configuration accuracy.
  • Confirm endpoint security is enabled.