Configure Device Posture global settings

The following are some of the global Device Posture settings that you can configure as required.

Periodic scanning of devices

You can enable periodic scanning of Windows devices for the configured checks every 30 minutes. The EPA client on the end device must be installed with administrative rights to enable periodic scanning of devices. To enable periodic scanning, do the following:

  1. Navigate to Device Posture > Device Scans and click Settings.
  2. In Periodic device posture scans section, slide the toggle switch ON to enable periodic scanning of devices.

Periodic scanning

Note:

  • During periodic scanning, if the outcome of a scan changes from Compliant to Non-compliant or Denied access, subsequent app launches are blocked, but there is no impact on the already launched apps.
  • If the device posture scan results in a downgrade (for example, device status changes from Compliant to Non-compliant or Denied access or from Non-compliant to Denied access), the following message appears. Also, all active TCP/UDP sessions are terminated.

Device downgrade

Customized messages for access denied scenarios

Admins have the option to customize the message that is displayed on the end device when an access is denied.

Perform the following steps to add customized messages:

  1. Navigate to the Device Posture > Device Scans page.
  2. Click Settings.
  3. Click Edit and in the Message box, enter the message that must be displayed in access denied scenarios. You can enter a maximum of 256 characters.
  4. Click Enable custom message on save to enforce the option of displaying the custom message. If you do not select this checkbox, the custom message is created but not displayed on the devices in access denied scenarios.

    Alternatively, you can enable the Custom message toggle switch on the Settings page to display the message on the devices.

  5. Click Save.

The following image displays a sample message added by the admin.

Customized message1

The following image displays the custom message that appears on the end user device when an access is denied.

Customized message2

The message that you have entered appears whenever access is denied for the end device.

Skip device posture checks

Admins can allow the end users to skip the device posture checks on their devices in the following scenarios:

  • The device posture agent is not installed on the device.
  • The EPA client installed on the device is not the latest version.

When the skip check feature is enabled, the default policy result (non-compliant) is enforced and the device is classified as non-compliant. End users are provided with partial or restricted access to the Citrix Secure Private Access or Citrix DaaS resources.

Enable skipping the device posture checks

  1. Navigate to Device Posture > Device Scans.
  2. Click Settings.
  3. In the Skip device posture check section, slide the toggle switch ON to enable skipping of the device posture checks.

    When the Skip device posture check option is enabled and the end user logs on to the Citrix Workspace, the following message appears when the end user tries to download the client or upgrade the EPA version.

    Alternately, you can continue to Citrix Workspace with restricted access.

Skip check message

Custom workspace URLs support

Custom workspace URLs are supported with the Device Posture service. You can use a URL that you own in addition to your cloud.com URL to access workspace. Ensure that you allow access to citrix.com from your network. For details on custom domains, see Configure a custom domain.

Session Recording configuration with Device Posture

Session Recording allows organizations to record on-screen user activity in virtual sessions. You can specify tags when creating a custom session recording policy, event detection policy, or event response policy. For an example, see Create a custom recording policy.

Device certificate check

To configure device certificate checks with the Device Posture service, admins must import an issuer certificate from their device. Once a valid issuer certificate is present in the Device Posture service, admins can use device certificate checks as part of device posture policies.

Points to note:

  • Device Posture service supports only PEM issuer certificate type.
  • For the device certificate check on Windows, the EPA client on the end device must be installed with administrative rights. For other checks, you do not require the local administrative rights. For details on the supported scans, see Scans supported by device posture.
  • To install the EPA client with administrative rights on Windows, run the following command in the location where the EPA client plug-in is downloaded.

    msiexec /i epasetup.msi

  • The device certificate check with the Device Posture service does not support the certificate revocation check.
  • If a device certificate is signed by an intermediate certificate, then you must upload the complete chain containing the root and the intermediate certificates in a single PEM file.

    Example: chain.pem
    
    -----BEGIN CERTIFICATE-----
    ******************************
    -----END CERTIFICATE-----
    -----BEGIN CERTIFICATE-----
    ******************************
    -----END CERTIFICATE
    

Upload device certificate

  1. Click Settings on the Device Posture home page.
  2. Click Manage, and then click Import Issue Certificate.
  3. In Certificate Type, select the certificate type. Only the PEM type is supported.
  4. In Certificate File, click Choose Certificate to select the issuer certificate.
  5. Click Open, and then click Import.

Import device certificate

The selected certificate is listed in Settings > Issuer Certificates. You can import multiple certificates.

View imported certificates

  1. Click Settings on the Device Posture home page.
  2. In Issuer Certificates, click Manage.
  3. The Issuer Certificates page lists the imported issuer certificates.

Imported certificate

Install the device certificate on the end device

Windows:

  1. From the Start menu, open Computer Certificate manager.
  2. Ensure that the certificate is installed in Certificates - Local Computer\Personal\Certificates.

    • The Intended Purposes must include Client Authentication.
    • The Issued By column must match the issuer name configured on the admin GUI.

Install certificate

macOS:

  1. Open Keychain Access and then select System.
  2. Click File > Import items to import the certificate.

    The Issued by field must display the certificate issuer name.

Install certificate macOS