For more information regarding the security incident at F5, the actions we are taking to address it, and our ongoing efforts to protect our customers, click here.

Forum Discussion

laser's avatar
laser
Icon for Altostratus rankAltostratus
Apr 19, 2024

F5 Access Guard Deprecated: ZTA APM

Since F5 Access Guard is deprecated and not supported on Win 11, newer browsers, and some versions of MacOS, what is the replacement for posture checking when implementing a ZeroTrust architecture using APM as an identify aware proxy?

One major point of ZT is to do continuous posture checking of a client and the requests they are making--each and every one utilizing a per-request policiy. Without this component, it seems like APM is not a great candidate for use.

What are others doing when using APM within their ZT network? Are they using 3rd part solutions with an HTTP connector to evaluate to client/request for each and every request?

3 Replies

  • Hi Laser, 

    I'm working as PME for Access security, and would like to answer the raised queries, I believe the answer can be summarized in the below points,

    • For customers using Microsoft Entra ID and Intune, F5 integrates and extends compliance and endpoint checks to network and apps. The enforcement is applied per-identity based on feeds from Microsoft Intune / Entra ID.  
    • Stay tuned for Next Access and features support releases. 

     

    I hope I answered your raised points. 

  • Hello heenakhanam0708​ 
    Yes, Access guard is no longer working, there are still some server side monitoring posture still supported, the non-supported is relying on Access Guard for the continuous monitoring. So, you can implement initla posture check at per-session level if needed at the start of the session, and some server side monitoring on the per-request. 

    The article you referenced should work if you have CrowdStrike or other 3rd party that perform continuous device posture assessment, then you can rely on HTTP Connector to fetch the status and extend the actions to the passing traffic. 

    I would recommend testing that with your Account / PS team as the article looks from 2019, just in case any changes to the windows registry keys used or CrowdStrike APIs. 

    I hope this answers your query.